CVE-2024-22421Relative Path Traversal in Jupyterlab

Severity
6.5MEDIUMNVD
CNA7.6
EPSS
0.1%
top 66.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 19

Description

JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages6 packages

NVDjupyter/jupyterlab4.0.04.0.11+1
CVEListV5jupyterlab/jupyterlab< 3.6.7+1
PyPIjupyterlab/jupyterlab4.0.04.0.11+1
Debianjupyterlab/jupyterlab< 4.0.11+ds1-1+1
NVDjupyter/notebook7.0.07.0.7

Also affects: Fedora 39

Patches

🔴Vulnerability Details

4
OSV
JupyterLab vulnerable to potential authentication and CSRF tokens leak2024-01-19
CVEList
Potential authentication and CSRF tokens leak in JupyterLab2024-01-19
GHSA
JupyterLab vulnerable to potential authentication and CSRF tokens leak2024-01-19
OSV
CVE-2024-22421: JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture2024-01-19

📋Vendor Advisories

1
Debian
CVE-2024-22421: jupyterlab - JupyterLab is an extensible environment for interactive and reproducible computi...2024
CVE-2024-22421 — Relative Path Traversal in Jupyterlab | cvebase