Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2020-26215: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

SUSE: CVE-2020-26215: SUSE Linux Security Advisory

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
11/18/2020
Created
01/11/2021
Added
01/08/2021
Modified
05/11/2021

Description

Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. The issue is patched in version 6.1.5.

Solution(s)

  • suse-upgrade-jupyter-notebook
  • suse-upgrade-jupyter-notebook-doc
  • suse-upgrade-jupyter-notebook-lang
  • suse-upgrade-jupyter-notebook-latex
  • suse-upgrade-python-jupyter_notebook-doc
  • suse-upgrade-python2-jupyter_notebook
  • suse-upgrade-python2-jupyter_notebook-lang
  • suse-upgrade-python2-jupyter_notebook-latex
  • suse-upgrade-python2-notebook
  • suse-upgrade-python2-notebook-lang
  • suse-upgrade-python3-jupyter_notebook
  • suse-upgrade-python3-jupyter_notebook-lang
  • suse-upgrade-python3-jupyter_notebook-latex
  • suse-upgrade-python3-notebook
  • suse-upgrade-python3-notebook-lang

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;