Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Jupyter ipython - Authorization Bypass

By kannthu

Critical
Vidoc logoVidoc Module
#unauth#jupyter
Description

What is the "Jupyter ipython - Authorization Bypass?"

The "Jupyter ipython - Authorization Bypass" module is designed to detect a vulnerability in Jupyter, specifically an authorization bypass. Jupyter is an open-source web application that allows users to create and share documents containing live code, equations, visualizations, and narrative text. This module focuses on identifying instances where Jupyter can be accessed without proper authentication.

This module has a severity level of critical, indicating that it poses a significant risk to the security of the Jupyter installation.

This module was authored by pentest_swissky.

Impact

An authorization bypass vulnerability in Jupyter ipython can allow unauthorized individuals to gain access to the application without providing valid credentials. This can lead to unauthorized access to sensitive information, potential data breaches, and unauthorized execution of code or commands.

How does the module work?

The "Jupyter ipython - Authorization Bypass" module works by sending a specific HTTP request to the target Jupyter instance and then applying matching conditions to determine if an authorization bypass vulnerability exists.

One example of an HTTP request used by this module is a GET request to the "/ipython/tree" path. The module checks for specific conditions in the response to identify the presence of the vulnerability.

The matching conditions used by this module include:

- Checking the HTTP response status code to ensure it is 200 (indicating a successful request). - Verifying the presence of certain keywords in the response body, such as "ipython/static/components" and "ipython/kernelspecs".

If all the matching conditions are met, the module reports the vulnerability.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/ipython/tree
Matching conditions
status: 200and
word: ipython/static/components, ipython/kerne...
Passive global matcher
No matching conditions.
On match action
Report vulnerability