In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade jupyterlab to version 4.5.7, 4.6.0a5 or higher.
jupyterlab is a JupyterLab computational environment.
Affected versions of this package are vulnerable to Client-Side Enforcement of Server-Side Security via improper enforcement of the allowed_extensions_uris. An attacker can gain unauthorized access to install unapproved extensions by sending crafted POST requests. This can lead to privilege escalation, data exfiltration, lateral movement within the network, and persistent compromise of the server infrastructure.
Note: This is only exploitable if the PyPI Extension Manager is enabled and the deployment relies on allow-listed extensions for security.
This vulnerability can be mitigated by switching the extension manager to read-only mode using the command line option '--LabApp.extension_manager=readonly' or by setting the traitlet 'c.LabApp.extension_manager = "readonly"'.