Metrics
Affected Vendors & Products
Thu, 07 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Wed, 06 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jupyter
Jupyter jupyter Server |
|
| Vendors & Products |
Jupyter
Jupyter jupyter Server |
Tue, 05 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, the secret used to sign authentication cookies is persisted to a static file at ~/.local/share/jupyter/runtime/jupyter_cookie_secret and is never rotated when a user changes their password. After a password reset and server restart, any previously issued authentication cookie remains cryptographically valid because the signing key has not changed. An attacker who has captured a session cookie through any means retains full authenticated access to the server regardless of subsequent password changes. This affects deployments using password-based authentication, particularly shared or public-facing servers where credential rotation is expected to revoke existing sessions. This issue has been fixed in version 2.18.0. | |
| Title | jupyter-server authentication cookies remain valid after password reset due to static cookie secret | |
| Weaknesses | CWE-613 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-05-05T21:31:42.897Z
Updated: 2026-05-07T12:48:21.223Z
Reserved: 2026-04-15T20:40:15.518Z
Link: CVE-2026-40934
Updated: 2026-05-06T14:51:42.855Z
Status : Awaiting Analysis
Published: 2026-05-05T22:16:00.820
Modified: 2026-05-07T15:06:11.573
Link: CVE-2026-40934
No data.
ReportizFlow