Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0239 | JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix. |
Github GHSA |
GHSA-44cc-43rp-5947 | JupyterLab vulnerable to potential authentication and CSRF tokens leak |
Tue, 17 Jun 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-17T21:19:25.169Z
Reserved: 2024-01-10T15:09:55.555Z
Link: CVE-2024-22421
Updated: 2025-06-17T21:15:57.364Z
Status : Modified
Published: 2024-01-19T21:15:09.870
Modified: 2024-11-21T08:56:15.343
Link: CVE-2024-22421
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA