CVE-2024-22421 — Relative Path Traversal in Jupyterlab
Severity
6.5MEDIUMNVD
CNA7.6
EPSS
0.1%
top 66.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 19
Description
JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes …
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6
Affected Packages6 packages
Also affects: Fedora 39
Patches
🔴Vulnerability Details
4OSV▶
CVE-2024-22421: JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture↗2024-01-19
📋Vendor Advisories
1Debian▶
CVE-2024-22421: jupyterlab - JupyterLab is an extensible environment for interactive and reproducible computi...↗2024