You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /examples/notebooks/tf_2_0/requirements.txt
Path to vulnerable library: /examples/notebooks/tf_2_0/requirements.txt,/examples/notebooks/tf_2_0/requirements.txt,/examples/notebooks/tf_2_2/requirements.txt,/examples/notebooks/tf_2_2/requirements.txt
The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.
CVE-2021-32798 - High Severity Vulnerability
Vulnerable Library - notebook-6.1.5-py3-none-any.whl
A web-based notebook environment for interactive computing
Library home page: https://files.pythonhosted.org/packages/81/e3/f92ab5688f53dc58dd2cc1b330828024527bb4e8d29bf980a096909b66e5/notebook-6.1.5-py3-none-any.whl
Path to dependency file: /examples/notebooks/tf_2_0/requirements.txt
Path to vulnerable library: /examples/notebooks/tf_2_0/requirements.txt,/examples/notebooks/tf_2_0/requirements.txt,/examples/notebooks/tf_2_2/requirements.txt,/examples/notebooks/tf_2_2/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 4e3aa8327ca6834d417f1c7de964019ba75cc2d1
Vulnerability Details
The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.
Publish Date: 2021-08-09
URL: CVE-2021-32798
CVSS 3 Score Details (9.6)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-hwvq-6gjx-j797
Release Date: 2021-08-09
Fix Resolution: notebook - 5.7.11, 6.4.1
The text was updated successfully, but these errors were encountered: