
Cloud Vulnerability DB
A community-led vulnerabilities database
The Jupyter Server, which provides backend services for Jupyter web applications like Jupyter notebook, JupyterLab, and Voila, was found to contain a vulnerability tracked as CVE-2023-49080. The vulnerability was discovered and disclosed in December 2023, affecting versions prior to 2.11.2. The issue involves unhandled errors in API requests from authenticated users that include traceback information containing potentially sensitive path information (GitHub Advisory).
The vulnerability stems from the server's error handling mechanism that exposes traceback information in JSON error responses when handling API requests. While this information can include system path details, it only occurs in responses to authenticated users who already have arbitrary execution permissions in the environment. The issue has been assigned a CVSS v3.1 base score of 4.3 (MEDIUM) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N by NIST NVD (NVD).
The vulnerability's impact is limited as it only affects authenticated users who already have execution permissions in the environment. The exposed path information in error tracebacks could potentially reveal system information, though this is not considered highly sensitive given the context of authenticated user access (GitHub Advisory).
The vulnerability has been patched in version 2.11.2 of the Jupyter Server. The fix modifies the error handling to no longer include traceback information in JSON error responses, while maintaining compatibility by keeping an empty traceback field. There are no known workarounds for this vulnerability, and users are advised to upgrade to the patched version (GitHub Advisory, Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."