Skip to content

Conversation

@renovate
Copy link

@renovate renovate bot commented Mar 29, 2022

WhiteSource Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
jupyter-server ==1.12.0 -> ==1.15.4 age adoption passing confidence
jupyter-server ==1.8.0 -> ==1.15.4 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2022-24757

Impact

What kind of vulnerability is it?

Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server.

Patches

Has the problem been patched? What versions should users upgrade to?

Upgrade to Jupyter Server version 1.15.4

For more information

If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org.

Credit: @​3coins for reporting. Thank you!


Configuration

📅 Schedule: "" (UTC).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about these updates again.


  • If you want to rebase/retry this PR, click this checkbox.

This PR has been generated by WhiteSource Renovate. View repository job log here.

@Programmer-RD-AI Programmer-RD-AI self-requested a review March 30, 2022 03:01
@Programmer-RD-AI Programmer-RD-AI merged commit a909a27 into main Mar 30, 2022
@renovate renovate bot deleted the renovate/pypi-jupyter-server-vulnerability branch March 30, 2022 03:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

3 participants