CVE-2022-39286: Execution with Unnecessary Privileges in JupyterApp
(updated )
What kind of vulnerability is it? Who is impacted?
We’d like to disclose an arbitrary code execution vulnerability in jupyter_core
that stems from jupyter_core
executing untrusted files in the current working directory. This vulnerability allows one user to run code as another.
References
- github.com/advisories/GHSA-m678-f26j-3hrp
- github.com/jupyter/jupyter_core
- github.com/jupyter/jupyter_core/commit/1118c8ce01800cb689d51f655f5ccef19516e283
- github.com/jupyter/jupyter_core/security/advisories/GHSA-m678-f26j-3hrp
- github.com/pypa/advisory-database/tree/main/vulns/jupyter-core/PYSEC-2022-42974.yaml
- lists.debian.org/debian-lts-announce/2022/11/msg00022.html
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KKMP5OXXIX2QAUNVNJZ5UEQFKDYYJVBA
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YIDN7JMLK6AOMBQI4QPSW4MBQGWQ5NIN
- nvd.nist.gov/vuln/detail/CVE-2022-39286
- security.gentoo.org/glsa/202301-04
- www.debian.org/security/2023/dsa-5422
Detect and mitigate CVE-2022-39286 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →