目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1110

100%

CVE-2026-40864— JupyterHub 跨站请求伪造绕过漏洞

CVSS 5.4 · Medium EPSS 0.01% · P3

影响版本矩阵 1

厂商产品版本范围状态
jupyterhubjupyterhub>= 4.1.0, < 5.4.5affected
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-40864 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
JupyterHub: Cross-origin form POSTs bypass XSRF
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
JupyterHub is software that allows users to create a multi-user server for Jupyter notebooks. In versions 4.1.0 through 5.4.4, XSRF protection (updated in 4.1.0) inappropriately treated requests with Sec-Fetch-Mode: no-cors as same-origin requests, bypassing XSRF checks. The JSON API is not affected, only HTTP form endpoints, such as /hub/spawn and /hub/accept-share, meaning attackers could trigger server spawn (but not access the server) and if the attacker is a JupyterHub user permitted to share access to their server, cause a user to accept a share and have access to the attacker's server. This issue has been fixed in version 5.4.5. If developers are unable to immediately upgrade, they can temporarily mitigate this issue by dropping requests to JupyterHub with Sec-Fetch-Mode: no-cors if they are using a reverse proxy.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
跨站请求伪造(CSRF)
来源: 美国国家漏洞数据库 NVD

受影响产品

厂商产品影响版本CPE订阅
jupyterhubjupyterhub >= 4.1.0, < 5.4.5 -

二、漏洞 CVE-2026-40864 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-40864 的情报信息

登录查看更多情报信息。

CVE-2026-40864 补丁与修复 (1)

CVE-2026-40864 厂商安全公告 (1)

IV. Related Vulnerabilities

V. Comments for CVE-2026-40864

暂无评论


发表评论