jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-01-18T20:27:39.180Z
Updated: 2024-09-10T20:44:01.301Z
Reserved: 2024-01-10T15:09:55.552Z
Link: CVE-2024-22415
Vulnrichment
Updated: 2024-08-01T22:43:34.913Z
NVD
Status : Analyzed
Published: 2024-01-18T21:15:09.087
Modified: 2024-01-30T15:22:32.770
Link: CVE-2024-22415
Redhat
No data.