CVE-2023-39968
Open Redirect Vulnerability vulnerability in jupyter-server (PyPI)
What is CVE-2023-39968 About?
This vulnerability in Jupyter Server is an Open Redirect flaw. It allows malicious login links to redirect successfully logged-in sessions or initial logins to arbitrary, untrusted websites. The exploitation is simple, typically leveraging social engineering tactics.
Affected Software
- jupyter-server
- <2.7.2
- <290362593b2ffb23c59f8114d76f77875de4b925
Technical Details
The flaw in Jupyter Server arises in its handling of login and redirection mechanisms. When a user logs in, or if an existing session is active and a login link is accessed, the server's redirection logic can be manipulated. If the application does not sufficiently validate the redirect_uri or similar parameters in a login request, an attacker can craft a URL containing an arbitrary external destination. Upon successful authentication or access, the Jupyter Server will redirect the user's browser to this attacker-controlled URL, thereby enabling an open redirect.
What is the Impact of CVE-2023-39968?
Successful exploitation may allow attackers to redirect users to malicious websites, facilitating phishing campaigns, malware delivery, or credential theft.
What is the Exploitability of CVE-2023-39968?
Exploitation requires crafting a malicious login link containing a controlled redirect destination. The complexity is low. While it targets logged-in sessions or the login process, explicit authentication via credentials isn't usually the attack vector; instead, it leverages the legitimate login flow. No specific privileges are necessary. This is a remote attack that relies on user interaction, specifically clicking on a crafted link. The risk increases if the Jupyter Server instance is publicly exposed and users are susceptible to social engineering.
What are the Known Public Exploits?
| PoC Author | Link | Commentary |
|---|---|---|
| No known exploits | ||
What are the Available Fixes for CVE-2023-39968?
Available Upgrade Options
- jupyter-server
- <290362593b2ffb23c59f8114d76f77875de4b925 → Upgrade to 290362593b2ffb23c59f8114d76f77875de4b925
- jupyter-server
- <2.7.2 → Upgrade to 2.7.2
Struggling with dependency upgrades?
See how Resolved Security's drop-in replacements make it simple.
Book a demoAdditional Resources
- https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-r726-vmfq-j9j3
- https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-r726-vmfq-j9j3
- https://github.com/pypa/advisory-database/tree/main/vulns/jupyter-server/PYSEC-2023-155.yaml
- https://github.com/jupyter-server/jupyter_server/commit/290362593b2ffb23c59f8114d76f77875de4b925
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRP7DNZYVOIA4ZB3U3ZWKTFZEPYWNGCQ
- https://blog.xss.am/2023/08/cve-2023-39968-jupyter-token-leak
- https://github.com/jupyter-server/jupyter_server/commit/290362593b2ffb23c59f8114d76f77875de4b925
- https://github.com/jupyter-server/jupyter_server
- https://nvd.nist.gov/vuln/detail/CVE-2023-39968
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XDKQAWQN6SQTOVACZNXYKEHWQXGG4DOF/
What are Similar Vulnerabilities to CVE-2023-39968?
Similar Vulnerabilities: CVE-2023-28370 , CVE-2023-41080 , CVE-2022-23307 , CVE-2020-15509 , CVE-2019-17558
