Lucene search

K
githubGitHub Advisory DatabaseGHSA-44CC-43RP-5947
HistoryJan 19, 2024 - 8:28 p.m.

JupyterLab vulnerable to potential authentication and CSRF tokens leak

2024-01-1920:28:10
CWE-200
GitHub Advisory Database
github.com
16
jupyterlab
csrf
authentication
tokens
leak
bug bounty
european commission
vulnerability
jupyter server
patch
intigriti
redirect vulnerability fix.

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.2%

Impact

Users of JupyterLab who click on a malicious link may get their Authorization and XSRFToken tokens exposed to a third party when running an older jupyter-server version.

Patches

JupyterLab 4.1.0b2, 4.0.11, and 3.6.7 were patched.

Workarounds

No workaround has been identified, however users should ensure to upgrade jupyter-server to version 2.7.2 or newer which includes a redirect vulnerability fix.

References

Vulnerability reported by user @davwwwx via the bug bounty program sponsored by the European Commission and hosted on the Intigriti platform.

Affected configurations

Vulners
Node
ipythonipython_notebookRange7.0.6
OR
jupyterjupyterlabRange3.6.6
OR
jupyterjupyterlabRange4.0.10

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.2%