You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.
mend-bolt-for-githubbot
changed the title
CVE-2021-32798 (High) detected in notebook-5.7.8-py2.py3-none-any.whl
CVE-2021-32798 (Critical) detected in notebook-5.7.8-py2.py3-none-any.whl
May 27, 2023
CVE-2021-32798 - Critical Severity Vulnerability
Vulnerable Library - notebook-5.7.8-py2.py3-none-any.whl
Jupyter Notebook - A web-based notebook environment for interactive computing
Library home page: https://files.pythonhosted.org/packages/f6/36/89ebfffc9dd8c8dbd81c1ffb53e3d4233ee666414c143959477cb07cc5f5/notebook-5.7.8-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.
Publish Date: 2021-08-09
URL: CVE-2021-32798
CVSS 3 Score Details (9.6)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-hwvq-6gjx-j797
Release Date: 2021-08-09
Fix Resolution: notebook - 5.7.11, 6.4.1
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: