CVE-2024-22421

JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:*
cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:*
cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

21 Nov 2024, 08:56

Type Values Removed Values Added
References () https://github.com/jupyterlab/jupyterlab/commit/19bd9b96cb2e77170a67e43121637d0b5619e8c6 - Patch () https://github.com/jupyterlab/jupyterlab/commit/19bd9b96cb2e77170a67e43121637d0b5619e8c6 - Patch
References () https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-44cc-43rp-5947 - Vendor Advisory () https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-44cc-43rp-5947 - Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/ - Mailing List, Third Party Advisory
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 7.6

10 Feb 2024, 02:51

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/ - Mailing List, Third Party Advisory
First Time Fedoraproject fedora
Fedoraproject

26 Jan 2024, 20:15

Type Values Removed Values Added
References () https://github.com/jupyterlab/jupyterlab/commit/19bd9b96cb2e77170a67e43121637d0b5619e8c6 - () https://github.com/jupyterlab/jupyterlab/commit/19bd9b96cb2e77170a67e43121637d0b5619e8c6 - Patch
References () https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-44cc-43rp-5947 - () https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-44cc-43rp-5947 - Vendor Advisory
CPE cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:*
cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

19 Jan 2024, 22:52

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-19 21:15

Updated : 2024-11-21 08:56


NVD link : CVE-2024-22421

Mitre link : CVE-2024-22421

CVE.ORG link : CVE-2024-22421


JSON object : View

Products Affected

fedoraproject

  • fedora

jupyter

  • notebook
  • jupyterlab
CWE
CWE-23

Relative Path Traversal

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor