CVE-2024-22421
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
19/01/2024
Last modified:
10/02/2024
Description
JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:* | 3.6.7 (excluding) | |
| cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:* | 4.0.0 (including) | 4.0.11 (excluding) |
| cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:* | 7.0.0 (including) | 7.0.7 (excluding) |
| cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



