First published: Wed Oct 26 2022(Updated: )
### Impact _What kind of vulnerability is it? Who is impacted?_ We’d like to disclose an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in the current working directory. This vulnerability allows one user to run code as another. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Users should upgrade to `jupyter_core>=4.11.2`. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ No ### References _Are there any links users can visit to find out more?_ Similar advisory in [IPython](https://github.com/advisories/GHSA-pq7m-3gw7-gq5x)
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jupyter-core | <=4.4.0-2 | 4.4.0-2+deb10u1 4.7.1-1+deb11u1 4.12.0-1 5.3.2-1 |
debian/jupyter-core | <=4.7.1-1<=4.11.1-1 | 4.11.2-1 4.7.1-1+deb11u1 |
pip/jupyter-core | <4.11.2 | 4.11.2 |
Jupyter Jupyter Core | <4.11.2 | |
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =11.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39286 is an arbitrary code execution vulnerability in Jupyter Core that allows one user to run code as another.
Users of Jupyter Core versions prior to 4.11.2 are impacted by CVE-2022-39286.
CVE-2022-39286 has a severity rating of 8.8 (High).
To fix CVE-2022-39286, update Jupyter Core to version 4.11.2 or higher.
You can find more information about CVE-2022-39286 on the GitHub Security Advisory page and the NVD website.