Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-44cc-43rp-5947

Опубликовано: 19 янв. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.6

Описание

JupyterLab vulnerable to potential authentication and CSRF tokens leak

Impact

Users of JupyterLab who click on a malicious link may get their Authorization and XSRFToken tokens exposed to a third party when running an older jupyter-server version.

Patches

JupyterLab 4.1.0b2, 4.0.11, and 3.6.7 were patched.

Workarounds

No workaround has been identified, however users should ensure to upgrade jupyter-server to version 2.7.2 or newer which includes a redirect vulnerability fix.

References

Vulnerability reported by user @davwwwx via the bug bounty program sponsored by the European Commission and hosted on the Intigriti platform.

Пакеты

Наименование

jupyterlab

pip
Затронутые версииВерсия исправления

>= 4.0.0, <= 4.0.10

4.0.11

Наименование

jupyterlab

pip
Затронутые версииВерсия исправления

<= 3.6.6

3.6.7

Наименование

notebook

pip
Затронутые версииВерсия исправления

>= 7.0.0, <= 7.0.6

7.0.7

EPSS

Процентиль: 34%
0.00138
Низкий

7.6 High

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 7.6
ubuntu
около 2 лет назад

JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix.

CVSS3: 7.6
nvd
около 2 лет назад

JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix.

CVSS3: 7.6
debian
около 2 лет назад

JupyterLab is an extensible environment for interactive and reproducib ...

EPSS

Процентиль: 34%
0.00138
Низкий

7.6 High

CVSS3

Дефекты

CWE-200