JupyterLab vulnerable to potential authentication and CSRF tokens leak
High severity
GitHub Reviewed
Published
Jan 19, 2024
in
jupyterlab/jupyterlab
•
Updated Feb 10, 2024
Description
Published to the GitHub Advisory Database
Jan 19, 2024
Reviewed
Jan 19, 2024
Published by the National Vulnerability Database
Jan 19, 2024
Last updated
Feb 10, 2024
Impact
Users of JupyterLab who click on a malicious link may get their
Authorization
andXSRFToken
tokens exposed to a third party when running an olderjupyter-server
version.Patches
JupyterLab 4.1.0b2, 4.0.11, and 3.6.7 were patched.
Workarounds
No workaround has been identified, however users should ensure to upgrade
jupyter-server
to version 2.7.2 or newer which includes a redirect vulnerability fix.References
Vulnerability reported by user @davwwwx via the bug bounty program sponsored by the European Commission and hosted on the Intigriti platform.
References