Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-22415
HistoryJan 18, 2024 - 8:27 p.m.

CVE-2024-22415 Unsecured endpoints in the jupyter-lsp server extension

2024-01-1820:27:39
CWE-284
CWE-23
CWE-306
GitHub_M
www.cve.org
vulnerability
jupyter-lsp
unauthorised access
file system
patched
upgrade

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.4%

jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp.

CNA Affected

[
  {
    "vendor": "jupyter-lsp",
    "product": "jupyterlab-lsp",
    "versions": [
      {
        "version": "< 2.2.2",
        "status": "affected"
      }
    ]
  }
]

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.4%

Related for CVELIST:CVE-2024-22415