Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-30167

Опубликовано: 03 июн. 2025
Источник: nvd
CVSS3: 7.3
EPSS Низкий

Описание

Jupyter Core is a package for the core common functionality of Jupyter projects. When using Jupyter Core prior to version 5.8.0 on Windows, the shared %PROGRAMDATA% directory is searched for configuration files (SYSTEM_CONFIG_PATH and SYSTEM_JUPYTER_PATH), which may allow users to create configuration files affecting other users. Only shared Windows systems with multiple users and unprotected %PROGRAMDATA% are affected. Users should upgrade to Jupyter Core version 5.8.0 or later to receive a patch. Some other mitigations are available. As administrator, modify the permissions on the %PROGRAMDATA% directory so it is not writable by unauthorized users; or as administrator, create the %PROGRAMDATA%\jupyter directory with appropriately restrictive permissions; or as user or administrator, set the %PROGRAMDATA% environment variable to a directory with appropriately restrictive permissions (e.g. controlled by administrators or the current user).

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:jupyter:jupyter_core:*:*:*:*:*:*:*:*
Версия до 5.8.0 (исключая)

EPSS

Процентиль: 3%
0.00017
Низкий

7.3 High

CVSS3

Дефекты

CWE-427

Связанные уязвимости

CVSS3: 7.3
ubuntu
8 месяцев назад

Jupyter Core is a package for the core common functionality of Jupyter projects. When using Jupyter Core prior to version 5.8.0 on Windows, the shared `%PROGRAMDATA%` directory is searched for configuration files (`SYSTEM_CONFIG_PATH` and `SYSTEM_JUPYTER_PATH`), which may allow users to create configuration files affecting other users. Only shared Windows systems with multiple users and unprotected `%PROGRAMDATA%` are affected. Users should upgrade to Jupyter Core version 5.8.0 or later to receive a patch. Some other mitigations are available. As administrator, modify the permissions on the `%PROGRAMDATA%` directory so it is not writable by unauthorized users; or as administrator, create the `%PROGRAMDATA%\jupyter` directory with appropriately restrictive permissions; or as user or administrator, set the `%PROGRAMDATA%` environment variable to a directory with appropriately restrictive permissions (e.g. controlled by administrators _or_ the current user).

CVSS3: 7.3
debian
8 месяцев назад

Jupyter Core is a package for the core common functionality of Jupyter ...

CVSS3: 7.3
github
8 месяцев назад

Jupyter Core on Windows Has Uncontrolled Search Path Element Local Privilege Escalation Vulnerability

CVSS3: 7.3
fstec
12 месяцев назад

Уязвимость ядра Jupyter Core среды интерактивной разработки и выполнения кода Jupyter Notebook, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 3%
0.00017
Низкий

7.3 High

CVSS3

Дефекты

CWE-427