Lucene search

K
gentooGentoo FoundationGLSA-202301-04
HistoryJan 11, 2023 - 12:00 a.m.

jupyter_core: Arbitrary Code Execution

2023-01-1100:00:00
Gentoo Foundation
security.gentoo.org
3
jupyter core
arbitrary code execution
privilege elevation

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

75.6%

Background

jupyter_core contains core Jupyter functionality.

Description

jupyter_core trusts files for execution in the current working directory without validating ownership of those files.

Impact

By writing to a directory that is used a the current working directory for jupyter_core by another user, users can elevate privileges to those of another user.

Workaround

There is no known workaround at this time.

Resolution

All jupyter_core users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/jupyter_core-4.11.2"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-python/jupyter_core< 4.11.2UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

75.6%