Description
JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. This vulnerability depends on user interaction by opening a malicious Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab version 4.0.11 has been patched. Users are advised to upgrade. Users unable to upgrade should disable the table of contents extension.
References (3)
Core 3
Core References
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/
Vendor Advisory x_refsource_confirm
https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4m77-cmpx-vjc4
Scores
CVSS v3
6.5
EPSS
0.0034
EPSS Percentile
56.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (5)
fedoraproject/fedora
39
jupyter/jupyterlab
4.0.0 - 4.0.11
jupyter/notebook
7.0.0 - 7.0.7
pypi/jupyterlab
4.0.0 - 4.0.11PyPI
pypi/notebook
7.0.0 - 7.0.7PyPI
Published
Jan 19, 2024
Tracked Since
Feb 18, 2026