Логотип exploitDog
bind:CVE-2022-24757
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-24757

Количество 4

Количество 4

ubuntu логотип

CVE-2022-24757

почти 4 года назад

The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications. Prior to version 1.15.4, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Jupyter Server version 1.15.4 contains a patch for this issue. There are currently no known workarounds.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-24757

почти 4 года назад

The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications. Prior to version 1.15.4, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Jupyter Server version 1.15.4 contains a patch for this issue. There are currently no known workarounds.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-24757

почти 4 года назад

The Jupyter Server provides the backend (i.e. the core services, APIs, ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-p737-p57g-4cpr

почти 4 года назад

Insertion of Sensitive Information into Log File in Jupyter notebook

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-24757

The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications. Prior to version 1.15.4, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Jupyter Server version 1.15.4 contains a patch for this issue. There are currently no known workarounds.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2022-24757

The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications. Prior to version 1.15.4, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Jupyter Server version 1.15.4 contains a patch for this issue. There are currently no known workarounds.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
debian логотип
CVE-2022-24757

The Jupyter Server provides the backend (i.e. the core services, APIs, ...

CVSS3: 7.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-p737-p57g-4cpr

Insertion of Sensitive Information into Log File in Jupyter notebook

CVSS3: 7.5
0%
Низкий
почти 4 года назад

Уязвимостей на страницу