CVE-2021-32797
Summary
| CVE | CVE-2021-32797 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-08-09 21:15:00 UTC |
| Updated | 2022-04-07 18:40:00 UTC |
| Description | JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html `<form>`. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| JupyterLab: XSS due to lack of sanitization of the action attribute of an HTML form · Advisory · jupyterlab/jupyterlab · GitHub |
CONFIRM |
github.com |
|
| Merge pull request from GHSA-4952-p58q-6crx · jupyterlab/jupyterlab@5048259 · GitHub |
MISC |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 980395 Python (pip) Security Update for notebook (GHSA-4952-p58q-6crx)