Home » Database

AVID-2026-R1123

Description

Execution with Unnecessary Privileges in JupyterApp (CVE-2022-39286)

Details

Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in jupyter_core that stems from jupyter_core executing untrusted files in CWD. This vulnerability allows one user to run code as another. Version 4.11.2 contains a patch for this issue. There are no known workarounds.

Reason for inclusion in AVID: CVE-2022-39286 describes an arbitrary code execution vulnerability in jupyter_core, a core component used in Jupyter notebooks and AI/ML workflows. This is a software vulnerability in a dependency commonly used to build/run AI systems, enabling code execution with elevated privileges. The issue affects components in the AI software stack (not just hardware/firmware) and has explicit security impact (RCE). Sufficient evidence is provided via the CVE description, patch info, and references.

References

Affected or Relevant Artifacts

  • Developer: jupyter
  • Deployer: jupyter
  • Artifact Details:
TypeName
Systemjupyter_core

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score8.8
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-269CWE-269: Improper Privilege Management
CWE-250CWE-250: Execution with Unnecessary Privileges

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2022-10-26
  • Version: 0.3.3
  • AVID Entry