Lucene search

K
cve[email protected]CVE-2024-22415
HistoryJan 18, 2024 - 9:15 p.m.

CVE-2024-22415

2024-01-1821:15:09
CWE-23
CWE-306
CWE-22
CWE-284
web.nvd.nist.gov
58
jupyter-lsp
coding assistance
jupyterlab
vulnerability
file system access control
operating system
jupyter-server
nvd
cve-2024-22415

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.5%

jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp.

Affected configurations

Vulners
NVD
Node
jupyter-lspjupyterlab_lspRange<2.2.2

CNA Affected

[
  {
    "vendor": "jupyter-lsp",
    "product": "jupyterlab-lsp",
    "versions": [
      {
        "version": "< 2.2.2",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.5%