Skip to content

Jupyter Notebook file bypasses sanitization, executes JavaScript

High severity GitHub Reviewed Published Jul 12, 2018 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

pip notebook (pip)

Affected versions

< 5.4.1

Patched versions

5.4.1

Description

In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.

References

Published to the GitHub Advisory Database Jul 12, 2018
Reviewed Jun 16, 2020
Last updated Jan 9, 2023

Severity

High
7.8
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Weaknesses

No CWEs

CVE ID

CVE-2018-8768

GHSA ID

GHSA-6cwv-x26c-w2q4

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.