Safety vulnerability ID: 42289
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Jupyter-server 1.1.1 includes a fix for CVE-2020-26275: In Jupyter Server before version 1.1.1, an open redirect vulnerability could cause the jupyter server to redirect the browser to a different malicious website. All jupyter servers running without a base_url prefix are technically affected, however, these maliciously crafted links can only be reasonably made by known jupyter server hosts. A link to your jupyter server may *appear* safe, but ultimately redirect to a spoofed server on the public internet. This same vulnerability was patched in upstream notebook v5.7.8. If upgrade is not available, a workaround can be to run your server on a url prefix: "jupyter server --ServerApp.base_url=/jupyter/".
Latest version: 2.14.2
The backend—i.e. core services, APIs, and REST endpoints—to Jupyter web applications.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application