Miggo Logo

CVE-2022-24758: Sensitive Auth & Cookie data stored in Jupyter server logs

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.4078%
Published
4/5/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
notebookpip< 6.4.106.4.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from error handling routines that log full request details. In Tornado-based applications like Jupyter Notebook:

  1. The primary suspect is request logging infrastructure that includes headers in error scenarios
  2. JupyterHandler.log_request is the core logging mechanism for HTTP requests
  3. Server logs containing auth cookies imply header values are being captured during error logging
  4. Websocket handlers would have similar logging patterns for errors
  5. The patch likely modified these logging functions to filter sensitive headers While exact pre-patch code isn't available, Jupyter's Tornado architecture patterns and the vulnerability description strongly implicate these core logging functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*nytim* * *xx *rror is tri***r**, t** *ut* *ooki* *n* ot**r *****r v*lu*s *r* r**or*** in Jupyt*r s*rv*r lo*s *y ****ult. *onsi**rin* t**s* lo*s *o not r*quir* root ****ss, *n *tt**k*r **n monitor t**s* lo*s, st**l s*nsitiv* *ut*/*ooki* in*orm*tion,

Reasoning

T** vuln*r**ility st*ms *rom *rror **n*lin* routin*s t**t lo* *ull r*qu*st **t*ils. In Torn**o-**s** *ppli**tions lik* Jupyt*r Not**ook: *. T** prim*ry susp**t is r*qu*st lo**in* in*r*stru*tur* t**t in*lu**s *****rs in *rror s**n*rios *. Jupyt*r**n*l