Cross-site Scripting (XSS) Affecting jupyterlab package, versions <4.0.11+ds1-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.06% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN13-JUPYTERLAB-6577832
  • published6 Apr 2024
  • disclosed19 Jan 2024

Introduced: 19 Jan 2024

CVE-2024-22420  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Debian:13 jupyterlab to version 4.0.11+ds1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jupyterlab package and not the jupyterlab package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. This vulnerability depends on user interaction by opening a malicious Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab version 4.0.11 has been patched. Users are advised to upgrade. Users unable to upgrade should disable the table of contents extension.

CVSS Base Scores

version 3.1