JupyterLab: XSS due to lack of sanitization of the action attribute of an html <form>
Description
Published by the National Vulnerability Database
Aug 9, 2021
Reviewed
Aug 23, 2021
Published to the GitHub Advisory Database
Aug 23, 2021
Last updated
Sep 23, 2024
Impact
Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook.
Patches
Patched in the following versions: 3.1.4, 3.0.17, 2.3.2, 2.2.10, 1.2.21.
References
OWASP Page on Restricting Form Submissions
For more information
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org.
Credit: Guillaume Jeanne from Google
References