Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hwvq-6gjx-j797

Опубликовано: 23 авг. 2021
Источник: github
Github: Прошло ревью
CVSS4: 7.8
CVSS3: 10

Описание

Special Element Injection in notebook

Impact

Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook.

Patches

5.7.11, 6.4.1

References

OWASP Page on Injection Prevention

For more information

If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org.

Credit: Guillaume Jeanne from Google

Example:

A notebook with the following content in a cell and it would display an alert when opened for the first time in Notebook (in an untrusted state):

{ "cell_type": "code", "execution_count": 0, "metadata": {}, "outputs": [ { "data": { "text/html": [ "<select><iframe></select><img src=x: onerror=alert('xss')>\n"], "text/plain": [] }, "metadata": {}, "output_type": "display_data" } ], "source": [ "" ] }

Пакеты

Наименование

notebook

pip
Затронутые версииВерсия исправления

< 5.7.11

5.7.11

Наименование

notebook

pip
Затронутые версииВерсия исправления

>= 6.0.0, < 6.4.1

6.4.1

EPSS

Процентиль: 45%
0.00226
Низкий

7.8 High

CVSS4

10 Critical

CVSS3

Дефекты

CWE-75
CWE-79
CWE-80

Связанные уязвимости

CVSS3: 10
ubuntu
больше 4 лет назад

The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.

CVSS3: 10
nvd
больше 4 лет назад

The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.

CVSS3: 10
debian
больше 4 лет назад

The Jupyter notebook is a web-based notebook environment for interacti ...

CVSS3: 9.6
fstec
больше 4 лет назад

Уязвимость компонента Caja среды создания документов блокнота Jupyter Notebook, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

suse-cvrf
больше 1 года назад

Security update for python-notebook

EPSS

Процентиль: 45%
0.00226
Низкий

7.8 High

CVSS4

10 Critical

CVSS3

Дефекты

CWE-75
CWE-79
CWE-80