CVE-2019-10255
Published: 28 March 2019
An Open Redirect vulnerability for all browsers in Jupyter Notebook before 5.7.7 and some browsers (Chrome, Firefox) in JupyterHub before 0.9.5 allows crafted links to the login page, which will redirect to a malicious site after successful login. Servers running on a base_url prefix are not affected.
Priority
Status
Package | Release | Status |
---|---|---|
jupyter-notebook Launchpad, Ubuntu, Debian |
upstream |
Released
(5.7.8-1)
|
trusty |
Does not exist
|
|
xenial |
Does not exist
|
|
focal |
Not vulnerable
(6.0.3-2)
|
|
groovy |
Not vulnerable
|
|
hirsute |
Not vulnerable
|
|
impish |
Not vulnerable
|
|
jammy |
Not vulnerable
|
|
bionic |
Released
(5.2.2-1ubuntu0.1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10255
- https://github.com/jupyter/notebook/commit/08c4c898182edbe97aadef1815cce50448f975cb
- https://github.com/jupyter/notebook/commit/70fe9f0ddb3023162ece21fbb77d5564306b913b
- https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4
- https://github.com/jupyter/notebook/commit/979e0bd15e794ceb00cc63737fcd5fd9addc4a99
- https://ubuntu.com/security/notices/USN-5585-1
- NVD
- Launchpad
- Debian