Miggo Logo

CVE-2019-10856: Jupyter Notebook open redirect vulnerability

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.54847%
Published
4/9/2019
Updated
9/26/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
notebookpip< 5.7.85.7.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows critical modifications to _redirect_safe in login.py, replacing a check for parsed.netloc with a path-only comparison using urlunparse. This indicates the original implementation's validation was incomplete. The added test cases (///jupyter.org, /\some-host) demonstrate exploitation vectors the function previously allowed. The CVE description explicitly references 'empty netloc' handling as the root cause, directly tied to this redirect validation function.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In Jupyt*r Not**ook ***or* *.*.*, *n op*n r**ir**t **n o**ur vi* *n *mpty n*tlo*. T*is issu* *xists ****us* o* *n in*ompl*t* *ix *or *V*-****-*****.

Reasoning

T** *ommit *i** s*ows *riti**l mo*i*i**tions to _r**ir**t_s*** in lo*in.py, r*pl**in* * ****k *or p*rs**.n*tlo* wit* * p*t*-only *omp*rison usin* urlunp*rs*. T*is in*i**t*s t** ori*in*l impl*m*nt*tion's v*li**tion w*s in*ompl*t*. T** ***** t*st **s*s