CVE-2022-24758: Sensitive Auth & Cookie data stored in Jupyter server logs
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.4078%
CWE
Published
4/5/2022
Updated
1/27/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
notebook | pip | < 6.4.10 | 6.4.10 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from error handling routines that log full request details. In Tornado-based applications like Jupyter Notebook:
- The primary suspect is request logging infrastructure that includes headers in error scenarios
- JupyterHandler.log_request is the core logging mechanism for HTTP requests
- Server logs containing auth cookies imply header values are being captured during error logging
- Websocket handlers would have similar logging patterns for errors
- The patch likely modified these logging functions to filter sensitive headers While exact pre-patch code isn't available, Jupyter's Tornado architecture patterns and the vulnerability description strongly implicate these core logging functions.