Описание
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| jupyter-notebook | fixed | 5.4.1-1 | package | |
| ipython | fixed | 5.1.0-2 | package | |
| ipython | no-dsa | jessie | package | |
| ipython | ignored | wheezy | package |
Примечания
After the reupload of ipython to Debian as 4.1.2-1 via experimental
src:ipython does not provide anymore the Notebook
https://www.openwall.com/lists/oss-security/2018/03/15/2
Fixed by: https://github.com/jupyter/notebook/commit/4e79ebb49acac722b37b03f1fe811e67590d3831
Ipython in Wheezy lacks sanitization of untrusted HTML completely
which means in theory this CVE does not apply. However due to the absence of
sanitization it is recommended not to use Ipython's notebook with untrusted
content. This issue is no-dsa because it cannot be determined if Ipython
in Wheezy is still affected, a fix appears to be to intrusive though. We recommend to
upgrade to a newer version instead.
EPSS
Связанные уязвимости
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
Jupyter Notebook file bypasses sanitization, executes JavaScript
EPSS