First published: Fri Jan 19 2024(Updated: )
### Impact Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. ### Patches JupyterLab 4.1.0b2, 4.0.11, and 3.6.7 were patched. ### Workarounds No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix. ### References Vulnerability reported by user @davwwwx via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/).
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/notebook | >=7.0.0<=7.0.6 | 7.0.7 |
pip/jupyterlab | <=3.6.6 | 3.6.7 |
pip/jupyterlab | >=4.0.0<=4.0.10 | 4.0.11 |
Jupyter Jupyterlab | <3.6.7 | |
Jupyter Jupyterlab | >=4.0.0<4.0.11 | |
Jupyter Notebook | >=7.0.0<7.0.7 | |
Fedora | =39 | |
Jupyter JupyterLab | <3.6.7 | |
Jupyter JupyterLab | >=4.0.0<4.0.11 | |
Fedoraproject Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.