CVE-2024-22421

JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:*
cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:*
cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

10 Feb 2024, 02:51

Type Values Removed Values Added
First Time Fedoraproject
Fedoraproject fedora
CPE cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/ - Mailing List, Third Party Advisory

02 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/ -

26 Jan 2024, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.6
v2 : unknown
v3 : 6.5
Summary
  • (es) JupyterLab es un entorno extensible para informática interactiva y reproducible, basado en Jupyter Notebook y Architecture. Los usuarios de JupyterLab que hacen clic en un enlace malicioso pueden exponer sus tokens de "Autorización" y "XSRFToken" a un tercero cuando ejecutan una versión anterior de "jupyter-server". Las versiones 4.1.0b2, 4.0.11 y 3.6.7 de JupyterLab están parcheadas. No se ha identificado ningún workaround; sin embargo, los usuarios deben asegurarse de actualizar `jupyter-server` a la versión 2.7.2 o posterior, que incluye una solución de vulnerabilidad de redireccionamiento.
First Time Jupyter
Jupyter jupyterlab
Jupyter notebook
References () https://github.com/jupyterlab/jupyterlab/commit/19bd9b96cb2e77170a67e43121637d0b5619e8c6 - () https://github.com/jupyterlab/jupyterlab/commit/19bd9b96cb2e77170a67e43121637d0b5619e8c6 - Patch
References () https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-44cc-43rp-5947 - () https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-44cc-43rp-5947 - Vendor Advisory
CPE cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*
cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:*

19 Jan 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-19 21:15

Updated : 2024-02-10 02:51


NVD link : CVE-2024-22421

Mitre link : CVE-2024-22421

CVE.ORG link : CVE-2024-22421


JSON object : View

Products Affected

jupyter

  • jupyterlab
  • notebook

fedoraproject

  • fedora
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-23

Relative Path Traversal