Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6cwv-x26c-w2q4

Опубликовано: 12 июл. 2018
Источник: github
Github: Прошло ревью
CVSS4: 8.4
CVSS3: 7.8

Описание

Jupyter Notebook file bypasses sanitization, executes JavaScript

In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.

Пакеты

Наименование

notebook

pip
Затронутые версииВерсия исправления

< 5.4.1

5.4.1

EPSS

Процентиль: 31%
0.0012
Низкий

8.4 High

CVSS4

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.

CVSS3: 7.8
nvd
почти 8 лет назад

In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.

CVSS3: 7.8
debian
почти 8 лет назад

In Jupyter Notebook before 5.4.1, a maliciously forged notebook file c ...

EPSS

Процентиль: 31%
0.0012
Низкий

8.4 High

CVSS4

7.8 High

CVSS3