jupyter-server@2.11.0 vulnerabilities

The backend—i.e. core services, APIs, and REST endpoints—to Jupyter web applications.

  • latest version

    2.15.0

  • latest non vulnerable version

  • first published

    6 years ago

  • latest version published

    4 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the jupyter-server package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Information Exposure

    Affected versions of this package are vulnerable to Information Exposure through the NTLMv2 password hash exposure process. An attacker can obtain and potentially crack this hash to gain unauthorized access to the Windows machine hosting the server or to other network-accessible machines or third-party services using the same credentials.

    How to fix Information Exposure?

    Upgrade jupyter-server to version 2.14.1 or higher.

    [,2.14.1)
    • M
    Generation of Error Message Containing Sensitive Information

    Affected versions of this package are vulnerable to Generation of Error Message Containing Sensitive Information. When handling API requests from an authenticated user, unhandled errors include traceback information, which can reveal path information. The revealed paths are not considered particularly sensitive, given that the requesting user has arbitrary execution permissions already in the same environment.

    How to fix Generation of Error Message Containing Sensitive Information?

    Upgrade jupyter-server to version 2.11.2 or higher.

    [,2.11.2)