PYSEC-2022-42974
Vulnerability from pysec - Published: 2022-10-26 20:15 - Updated: 2022-11-09 01:10
VLAI?
Details
Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in jupyter_core that stems from jupyter_core executing untrusted files in CWD. This vulnerability allows one user to run code as another. Version 4.11.2 contains a patch for this issue. There are no known workarounds.
Impacted products
| Name | purl | jupyter-core | pkg:pypi/jupyter-core |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "jupyter-core",
"purl": "pkg:pypi/jupyter-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1118c8ce01800cb689d51f655f5ccef19516e283"
}
],
"repo": "https://github.com/jupyter/jupyter_core",
"type": "GIT"
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.11.2"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"4.0.0",
"4.0.0.dev",
"4.0.1",
"4.0.2",
"4.0.3",
"4.0.4",
"4.0.5",
"4.0.6",
"4.1.0",
"4.1.1",
"4.10.0",
"4.11.0",
"4.11.1",
"4.2.0",
"4.2.1",
"4.3.0",
"4.4.0",
"4.5.0",
"4.6.0",
"4.6.1",
"4.6.2",
"4.6.3",
"4.7.0",
"4.7.0rc0",
"4.7.1",
"4.8.0",
"4.8.0b0",
"4.8.0rc0",
"4.8.0rc1",
"4.8.1",
"4.8.2",
"4.9.0",
"4.9.0rc0",
"4.9.1",
"4.9.1rc0",
"4.9.2"
]
}
],
"aliases": [
"CVE-2022-39286",
"GHSA-m678-f26j-3hrp"
],
"details": "Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in CWD. This vulnerability allows one user to run code as another. Version 4.11.2 contains a patch for this issue. There are no known workarounds.",
"id": "PYSEC-2022-42974",
"modified": "2022-11-09T01:10:28.819496Z",
"published": "2022-10-26T20:15:00Z",
"references": [
{
"type": "FIX",
"url": "https://github.com/jupyter/jupyter_core/commit/1118c8ce01800cb689d51f655f5ccef19516e283"
},
{
"type": "ADVISORY",
"url": "https://github.com/jupyter/jupyter_core/security/advisories/GHSA-m678-f26j-3hrp"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…