Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-22421


JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix.


Published

2024-01-19T21:15:09.870

Last Modified

2024-11-21T08:56:15.343

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.6 (HIGH)

Weaknesses
  • Type: Primary
    CWE-23
    CWE-200

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application jupyter jupyterlab < 3.6.7 Yes
Application jupyter jupyterlab < 4.0.11 Yes
Application jupyter notebook < 7.0.7 Yes
Operating System fedoraproject fedora 39 Yes

References