CWE
79
EPSS
0.052%
Advisory Published
CVE Published
Updated

CVE-2024-22420: Stored cross site scripting in Markdown Preview in JupyterLab

First published: Fri Jan 19 2024(Updated: )

### Impact The vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. ### Patches JupyterLab v4.0.11 was patched. ### Workarounds Users can either disable the table of contents extension by running: ```bash jupyter labextension disable @jupyterlab/toc-extension:registry ``` ### References Vulnerability reported via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/).

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
pip/notebook>=7.0.0<=7.0.6
7.0.7
pip/jupyterlab>=4.0.0<=4.0.10
4.0.11
Jupyter Jupyterlab>=4.0.0<4.0.11
Jupyter Notebook>=7.0.0<7.0.7
Fedora=39
Jupyter JupyterLab>=4.0.0<4.0.11
Fedoraproject Fedora=39

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-22420?

    CVE-2024-22420 is considered a high severity vulnerability as it allows attackers to access sensitive data by exploiting user interactions.

  • How do I fix CVE-2024-22420?

    To fix CVE-2024-22420, upgrade the JupyterLab package to version 4.0.11 or later and the Notebook package to version 7.0.7 or later.

  • What is the impact of CVE-2024-22420?

    The impact of CVE-2024-22420 includes unauthorized access to user data and the ability to perform arbitrary requests on behalf of the user.

  • Which software is affected by CVE-2024-22420?

    CVE-2024-22420 affects JupyterLab versions from 4.0.0 to 4.0.10 and Notebook versions from 7.0.0 to 7.0.6.

  • What user action is required to trigger CVE-2024-22420?

    CVE-2024-22420 requires user interaction, specifically opening a malicious notebook or Markdown file in JupyterLab.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203