CVE-2024-22415: Unsecured endpoints in the jupyter-lsp server extension
7.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3855%
CWE
Published
1/18/2024
Updated
1/30/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| jupyter-lsp | pip | <= 2.2.1 | 2.2.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two main issues: 1) Missing authentication in WebSocket/REST handlers (CWE-306) and 2) Path traversal via unvalidated URI-to-path conversion (CWE-22/23). The patch adds auth decorators (@web.authenticated, @authorized) to handlers and implements is_relative path validation. The vulnerable functions were directly handling network endpoints without security checks and processing file paths without containment validation. Test cases like test_shadow_traversal validate the path traversal fix, confirming this was an attack vector.