Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: python313Packages.jupyterlab

Found 1 matching suggestions

View:
Compact
Detailed
Published
updated an hour ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    29 packages
    • rednotebook
    • wolfram-notebook
    • python312Packages.notebook-shim
    • python313Packages.notebook-shim
    • python314Packages.notebook-shim
    • python312Packages.jupyterlab-vim
    • python312Packages.jupyterlab-lsp
    • python312Packages.jupyterlab-git
    • python313Packages.jupyterlab-git
    • python313Packages.jupyterlab-lsp
    • python313Packages.jupyterlab-vim
    • python314Packages.jupyterlab-git
    • python314Packages.jupyterlab-lsp
    • python314Packages.jupyterlab-vim
    • python312Packages.pytest-notebook
    • python313Packages.pytest-notebook
    • python314Packages.pytest-notebook
    • python312Packages.jupyterlab-server
    • python313Packages.jupyterlab-server
    • python314Packages.jupyterlab-server
    • python312Packages.jupyterlab-widgets
    • python313Packages.jupyterlab-widgets
    • python314Packages.jupyterlab-widgets
    • python312Packages.jupyterlab-pygments
    • python313Packages.jupyterlab-pygments
    • python314Packages.jupyterlab-pygments
    • python312Packages.jupyterlab-execute-time
    • python313Packages.jupyterlab-execute-time
    • python314Packages.jupyterlab-execute-time
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jupyter Notebook and JupyterLab token theft via stored XSS in help command linker

In Jupyter Notebook versions 7.0.0 through 7.5.5, JupyterLab versions 4.5.6 and earlier, and the corresponding @jupyter-notebook/help-extension and @jupyterlab/help-extension packages before 7.5.6 and 4.5.7, a stored cross-site scripting issue in the help command linker can be chained with attacker-controlled notebook content to steal authentication tokens with a single click. An attacker can craft a malicious notebook file containing elements that appear indistinguishable from legitimate controls and trigger execution when a user interacts with them. Successful exploitation allows theft of the user's authentication token and complete takeover of the Jupyter session through the REST API, including reading files, creating or modifying files, accessing kernels to execute arbitrary code, and creating terminals for shell access. This issue has been fixed in Notebook 7.5.6, JupyterLab 4.5.7, @jupyter-notebook/help-extension 7.5.6, and @jupyterlab/help-extension 4.5.7. As a workaround, disable the affected help extensions or set allowCommandLinker to false in the sanitizer configuration.

Affected products

notebook
  • ==>=7.0.0, <= 7.5.5
jupyterlab
  • ==<= 4.5.6
help-extension
  • ==<=4.5.6
  • ==>=7.0.0,<= 7.5.5

Matching in nixpkgs

Ignored packages (29)

pkgs.rednotebook

Modern journal that includes a calendar navigation, customizable templates, export functionality and word clouds

  • nixos-unstable 2.42
    • nixpkgs-unstable 2.42
    • nixos-unstable-small 2.42
  • nixos-25.11 2.41
    • nixos-25.11-small 2.41
    • nixpkgs-25.11-darwin 2.41

pkgs.wolfram-notebook

None

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin

Package maintainers