A dangerous vulnerability discovered in Jupyter Notebook

The Jupyter Notebook has an Open redirect flaw until version 6.1.5. The browser could be diverted to another website through a maliciously designed connection to a notebook server.

Thursday, November 19, 2020, 08:49 GMT

Technically, all notebook servers are affected, but only established notebook server hosts can logically create these maliciously constructed connections. A connection to your notebook server will seem stable, but it will inevitably be diverted to a spoofed server on the public Internet. The problem is corrected in version 6.1.5.

Impact
What kind of vulnerability is it? Who is impacted?

Open redirect vulnerability – a maliciously crafted link to a notebook server could redirect the browser to a different website.

All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet.

Patches
Has the problem been patched? What versions should users upgrade to?

Patched in notebook 6.1.5

References
OWASP page on open redirects

For more information
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [email protected].