Description
Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. The issue is patched in version 6.1.5.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_confirm
https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh
Patch, Third Party Advisory x_refsource_misc
https://github.com/jupyter/notebook/commit/3cec4bbe21756de9f0c4bccf18cf61d840314d74
Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/12/msg00004.html
Scores
CVSS v3
4.4
EPSS
0.0077
EPSS Percentile
73.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
Details
CWE
CWE-601
Status
published
Products (3)
debian/debian_linux
9.0
jupyter/notebook
< 6.1.5
pypi/notebook
0 - 6.1.5PyPI
Published
Nov 18, 2020
Tracked Since
Feb 18, 2026