Advisories for Pypi/Jupyterlab package

2024

Relative Path Traversal

JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their Authorization and XSRFToken tokens exposed to a third party when running an older jupyter-server version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade jupyter-server to version 2.7.2 or newer which …

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. This vulnerability depends on user interaction by opening a malicious Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab version 4.0.11 has been patched. Users are advised to upgrade. Users …

2021

Cross-site Scripting

JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. JupyterLab doesn’t sanitize the action attribute of html <form>. Using this, it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.