CVE-2021-41247

CVSS v3 Score
7.5
High
CVSS v2 Score
5.0
Medium

Vulnerability Description

JupyterHub is an open source multi-user server for Jupyter notebooks. In affected versions users who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the logout takes place. Upgrade to JupyterHub 1.5. For distributed deployments, it is jupyterhub in the _user_ environment that needs patching. There are no patches necessary in the Hub environment. The only workaround is to make sure that only one JupyterLab tab is open when you log out.

CVSS:7.5(High)

The NETGEAR genie application before 2.4.34 for Android is affected by mishandling of hard-coded API keys and session IDs.

CVSS:7.5(High)

The REST/JSON project 7.x-1.x for Drupal allows session name guessing, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.

CVSS:7.5(High)

It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session. An attacker could use this flaw to gain access to an authenticated user session, leading to possible i...

CVSS:7.5(High)

In JetBrains TeamCity before 2019.2.1, the application state is kept alive after a user ends his session.

CVSS:7.5(High)

In JetBrains Space through 2020-04-22, the session timeout period was configured improperly.

CVSS:7.5(High)

Gophish through 0.10.1 does not invalidate the gophish cookie upon logout.