// For flags

CVE-2024-22420

Stored cross site scripting in Markdown Preview in JupyterLab

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. This vulnerability depends on user interaction by opening a malicious Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab version 4.0.11 has been patched. Users are advised to upgrade. Users unable to upgrade should disable the table of contents extension.

JupyterLab es un entorno extensible para informática interactiva y reproducible, basado en Jupyter Notebook y Architecture. Esta vulnerabilidad depende de la interacción del usuario al abrir un archivo Markdown malicioso utilizando la función de vista previa de JupyterLab. Un usuario malintencionado puede acceder a cualquier dato a los que tenga acceso el usuario atacado, así como realizar solicitudes arbitrarias actuando como el usuario atacado. Se ha parcheado la versión 4.0.11 de JupyterLab. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben desactivar la extensión de la tabla de contenido.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2024-01-10 CVE Reserved
  • 2024-01-19 CVE Published
  • 2024-02-08 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Jupyter
Search vendor "Jupyter"
Jupyterlab
Search vendor "Jupyter" for product "Jupyterlab"
>= 4.0.0 < 4.0.11
Search vendor "Jupyter" for product "Jupyterlab" and version " >= 4.0.0 < 4.0.11"
-
Affected
Jupyter
Search vendor "Jupyter"
Notebook
Search vendor "Jupyter" for product "Notebook"
>= 7.0.0 < 7.0.7
Search vendor "Jupyter" for product "Notebook" and version " >= 7.0.0 < 7.0.7"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
39
Search vendor "Fedoraproject" for product "Fedora" and version "39"
-
Affected