Product
high
advisory
Jupyter Server Path Traversal Vulnerability
2 rules 1 TTPJupyter Server version 2.17.0 and earlier is vulnerable to a path traversal vulnerability due to an insufficient check on the root directory, allowing an authenticated user to access, read, write, and delete content outside the server's root directory in sibling directories that share the same prefix as the root directory, potentially leading to privilege escalation in multi-tenant environments.
Jupyter Server
path-traversal
privilege-escalation
jupyter
2r
1t
high
advisory
Jupyter Server CORS Origin Validation Bypass via Regex
2 rules 1 TTPJupyter Server versions 2.17.0 and earlier are vulnerable to a CORS origin validation bypass due to improper use of `re.match()` in validating the Origin header against the `allow_origin_pat` configuration, allowing attackers to bypass CORS restrictions.
jupyter-server
cors
origin-validation
regex
web-application
2r
1t