You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their Authorization and XSRFToken tokens exposed to a third party when running an older jupyter-server version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade jupyter-server to version 2.7.2 or newer which includes a redirect vulnerability fix.
JupyterLab computational environment
Library home page: https://files.pythonhosted.org/packages/2b/d4/e0627f216bfb451e807cb8c2c8a0fc27e47cc76e483e539e8e213b95518e/jupyterlab-3.5.0-py3-none-any.whl
Found in HEAD commit: 653435dffecc04a7e4fcc7cbf73f04258b4cc039
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - jupyterlab-3.5.0-py3-none-any.whl
JupyterLab computational environment
Library home page: https://files.pythonhosted.org/packages/2b/d4/e0627f216bfb451e807cb8c2c8a0fc27e47cc76e483e539e8e213b95518e/jupyterlab-3.5.0-py3-none-any.whl
Dependency Hierarchy:
Found in HEAD commit: 653435dffecc04a7e4fcc7cbf73f04258b4cc039
Found in base branch: main
Vulnerability Details
JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their
Authorization
andXSRFToken
tokens exposed to a third party when running an olderjupyter-server
version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgradejupyter-server
to version 2.7.2 or newer which includes a redirect vulnerability fix.Publish Date: 2024-01-19
URL: CVE-2024-22421
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-22421
Release Date: 2024-01-19
Fix Resolution: 3.6.7
The text was updated successfully, but these errors were encountered: