cve/2020/CVE-2020-26215.md

19 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-26215](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26215)
![](https://img.shields.io/static/v1?label=Product&message=notebook&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=%7B%22CWE-601%22%3A%22URL%20Redirection%20to%20Untrusted%20Site%20('Open%20Redirect')%22%7D&color=brighgreen)
### Description
Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. The issue is patched in version 6.1.5.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/RonenDabach/python-tda-bug-hunt-2