Описание
JupyterLab: XSS due to lack of sanitization of the action attribute of an html
Impact
Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook.
Patches
Patched in the following versions: 3.1.4, 3.0.17, 2.3.2, 2.2.10, 1.2.21.
References
OWASP Page on Restricting Form Submissions
For more information
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org.
Credit: Guillaume Jeanne from Google
Ссылки
- https://github.com/google/security-research/security/advisories/GHSA-c469-p3jp-2vhx
- https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx
- https://nvd.nist.gov/vuln/detail/CVE-2021-32797
- https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed
- https://github.com/pypa/advisory-database/tree/main/vulns/jupyterlab/PYSEC-2021-130.yaml
Пакеты
jupyterlab
< 1.2.21
1.2.21
jupyterlab
>= 2.0.0a0, < 2.2.10
2.2.10
jupyterlab
>= 2.3.0a0, < 2.3.2
2.3.2
jupyterlab
>= 3.0.0a0, < 3.0.17
3.0.17
jupyterlab
>= 3.1.0a0, < 3.1.4
3.1.4
notebook
< 5.7.11
5.7.11
notebook
>= 6.0.0, < 6.4.1
6.4.1
EPSS
6.3 Medium
CVSS4
7.4 High
CVSS3
CVE ID
Дефекты
Связанные уязвимости
JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html `<form>`. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.
JupyterLab is a user interface for Project Jupyter which will eventual ...
EPSS
6.3 Medium
CVSS4
7.4 High
CVSS3