Safety vulnerability ID: 71937
The information on this page was manually curated by our Cybersecurity Intelligence Team.
jupyter_scheduler has a missing authentication check in Jupyter Server on an API endpoint (GET /scheduler/runtime_environments) which lists the names of the Conda environments on the server. In affected versions, this allows an unauthenticated user to obtain the list of Conda environment names on the server, potentially revealing sensitive information embedded in those names.
Latest version: 2.10.0
A JupyterLab extension for running notebook jobs
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application