The vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature.
A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user.
JupyterLab v4.0.11 was patched.
Users can either disable the table of contents extension by running:
jupyter labextension disable @jupyterlab/toc-extension:registry
Vulnerability reported via the bug bounty program sponsored by the European Commission and hosted on the Intigriti platform.
{ "nvd_published_at": "2024-01-19T21:15:09Z", "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-01-19T20:24:09Z" }