Relative Path Traversal Affecting jupyterlab-lsp package, versions [,5.0.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Relative Path Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-JUPYTERLABLSP-6180562
  • published25 Jan 2024
  • disclosed18 Jan 2024
  • creditBary Levy

Introduced: 18 Jan 2024

CVE-2024-22415  (opens in a new tab)
CWE-23  (opens in a new tab)

How to fix?

Upgrade jupyterlab-lsp to version 5.0.2 or higher.

Overview

jupyterlab-lsp is a Coding assistance for JupyterLab with Language Server Protocol

Affected versions of this package are vulnerable to Relative Path Traversal due configured file system without access control on the operating system level and jupyter-server instances exposed to non-trusted network. An unauthorised attacker could gain access and modify the file system beyond the jupyter root directory.

Workaround

Users of jupyterlab who do not use jupyterlab-lsp can uninstall jupyter-lsp.

References

CVSS Scores

version 3.1