RCE Vulnerability Affects JupyterLab Extension Template
CVE-2024-39700

10CRITICAL

Key Information:

Vendor

Jupyterlab

Vendor
CVE Published:
16 July 2024

Badges

๐Ÿ‘พ Exploit Exists

What is CVE-2024-39700?

The JupyterLab extension template is vulnerable due to an insecure configuration in the update-integration-tests.yml workflow, allowing remote code execution (RCE). This vulnerability affects repositories created using this template with the test option enabled. Extension developers are advised to upgrade to the latest template version to mitigate risk. Users who have customized the update-integration-tests.yml should back up their changes, accept potential overwrites during the upgrade, and may need to disable GitHub Actions temporarily. Additionally, it is recommended to rebase any open pull requests from untrusted contributors as they may utilize outdated versions from the main branch during execution. For users migrating from versions prior to 4.3.0, it is advisable to hold off on implementing proposed changes to the release workflow, necessitating additional configuration for security enhancement.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

extension-template < 4.3.3

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

.