We found results for “”
CVE-2024-22421
Good to know:
Date: January 19, 2024
JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their "Authorization" and "XSRFToken" tokens exposed to a third party when running an older "jupyter-server" version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade "jupyter-server" to version 2.7.2 or newer which includes a redirect vulnerability fix.
Language: Python
Severity Score
Related Resources (10)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version jupyterlab - 4.0.11;jupyterlab - 3.6.7;notebook - 7.0.7
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | LOW |
| Availability (A): | LOW |
Vulnerabilities
Projects
Contact Us


