Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-8768

Опубликовано: 18 мар. 2018
Источник: debian
EPSS Низкий

Описание

In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jupyter-notebookfixed5.4.1-1package
ipythonfixed5.1.0-2package
ipythonno-dsajessiepackage
ipythonignoredwheezypackage

Примечания

  • After the reupload of ipython to Debian as 4.1.2-1 via experimental

  • src:ipython does not provide anymore the Notebook

  • https://www.openwall.com/lists/oss-security/2018/03/15/2

  • Fixed by: https://github.com/jupyter/notebook/commit/4e79ebb49acac722b37b03f1fe811e67590d3831

  • Ipython in Wheezy lacks sanitization of untrusted HTML completely

  • which means in theory this CVE does not apply. However due to the absence of

  • sanitization it is recommended not to use Ipython's notebook with untrusted

  • content. This issue is no-dsa because it cannot be determined if Ipython

  • in Wheezy is still affected, a fix appears to be to intrusive though. We recommend to

  • upgrade to a newer version instead.

EPSS

Процентиль: 31%
0.0012
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.

CVSS3: 7.8
nvd
почти 8 лет назад

In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.

CVSS3: 7.8
github
больше 7 лет назад

Jupyter Notebook file bypasses sanitization, executes JavaScript

EPSS

Процентиль: 31%
0.0012
Низкий