CVE-2024-22421
Potential authentication and CSRF tokens leak in JupyterLab
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix.
JupyterLab es un entorno extensible para informática interactiva y reproducible, basado en Jupyter Notebook y Architecture. Los usuarios de JupyterLab que hacen clic en un enlace malicioso pueden exponer sus tokens de "Autorización" y "XSRFToken" a un tercero cuando ejecutan una versión anterior de "jupyter-server". Las versiones 4.1.0b2, 4.0.11 y 3.6.7 de JupyterLab están parcheadas. No se ha identificado ningún workaround; sin embargo, los usuarios deben asegurarse de actualizar `jupyter-server` a la versión 2.7.2 o posterior, que incluye una solución de vulnerabilidad de redireccionamiento.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2024-01-10 CVE Reserved
- 2024-01-19 CVE Published
- 2024-02-08 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-23: Relative Path Traversal
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/jupyterlab/jupyterlab/commit/19bd9b96cb2e77170a67e43121637d0b5619e8c6 | 2024-02-10 |
URL | Date | SRC |
---|---|---|
https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-44cc-43rp-5947 | 2024-02-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Jupyter Search vendor "Jupyter" | Jupyterlab Search vendor "Jupyter" for product "Jupyterlab" | < 3.6.7 Search vendor "Jupyter" for product "Jupyterlab" and version " < 3.6.7" | - |
Affected
| ||||||
Jupyter Search vendor "Jupyter" | Jupyterlab Search vendor "Jupyter" for product "Jupyterlab" | >= 4.0.0 < 4.0.11 Search vendor "Jupyter" for product "Jupyterlab" and version " >= 4.0.0 < 4.0.11" | - |
Affected
| ||||||
Jupyter Search vendor "Jupyter" | Notebook Search vendor "Jupyter" for product "Notebook" | >= 7.0.0 < 7.0.7 Search vendor "Jupyter" for product "Notebook" and version " >= 7.0.0 < 7.0.7" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 39 Search vendor "Fedoraproject" for product "Fedora" and version "39" | - |
Affected
|