CVE-2022-29238: Token bruteforcing.
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.47672%
CWE
Published
6/16/2022
Updated
1/27/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| notebook | pip | < 6.4.12 | 6.4.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing hidden file checks in file access methods despite allow_hidden=False. The workaround guidance explicitly mentions adding self.is_hidden(path) checks in ContentsManager methods, indicating these functions lacked proper authorization checks. The get() method handles file retrieval while _get_os_path() handles path resolution - both critical points where hidden file validation should occur. The high confidence comes from the advisory's direct implication of missing is_hidden checks in file access flows.