CVE-2025-30370

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-30370
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-30370.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-30370
Aliases
Related
Published
2025-04-03T22:15:21Z
Modified
2025-04-07T17:45:55.396035Z
Summary
[none]
Details

jupyterlab-git is a JupyterLab extension for version control using Git. On many platforms, a third party can create a Git repository under a name that includes a shell command substitution string in the syntax $(<command>). These directory names are allowed in macOS and a majority of Linux distributions. If a user starts jupyter-lab in a parent directory of this inappropriately-named Git repository, opens it, and clicks "Git > Open Git Repository in Terminal" from the menu bar, then the injected command <command> is run in the user's shell without the user's permission. This issue is occurring because when that menu entry is clicked, jupyterlab-git opens the terminal and runs cd <git-repo-path> through the shell to set the current directory. Doing so runs any command substitution strings present in the directory name, which leads to the command injection issue described here. A previous patch provided an incomplete fix. This vulnerability is fixed in 0.51.1.

References

Affected packages

Git / github.com/jupyterlab/jupyterlab-git

Affected ranges

Type
GIT
Repo
https://github.com/jupyterlab/jupyterlab-git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.10.0
v0.20.0
v0.20.0rc0
v0.21.0
v0.21.0a0
v0.21.0a1
v0.21.0rc0
v0.21.1
v0.22.0
v0.22.1
v0.22.2
v0.22.3
v0.23.0
v0.23.1
v0.23.2
v0.23.3
v0.3.0
v0.30.0
v0.30.0b1
v0.30.0b1.post1
v0.30.0b2
v0.30.0b3
v0.30.1
v0.31.0
v0.31.0a0
v0.32.0
v0.32.1
v0.32.2
v0.33.0
v0.34.0
v0.34.1
v0.34.2
v0.35.0
v0.36.0
v0.37.0
v0.37.1
v0.38.0
v0.39.0
v0.39.1
v0.39.2
v0.39.3
v0.39.3.post1
v0.4.0
v0.4.1
v0.4.2
v0.4.4
v0.40.0
v0.40.1
v0.41.0
v0.42.0
v0.42.0rc0
v0.43.0
v0.44.0
v0.5.0
v0.50.0
v0.50.0a0
v0.50.0a1
v0.50.0a2
v0.50.0rc0
v0.50.1
v0.50.2
v0.51.0
v0.6.0
v0.6.1
v0.6.1-alpha.0
v0.7.1
v0.8
v0.8.1
v0.8.2
v0.9.0
v0.9.0rc1