CVE-2021-32797 — Cross-site Scripting in Jupyterlab
Severity
9.6CRITICALNVD
CNA7.4
EPSS
0.9%
top 24.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 9
Latest updateJun 30
Description
JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html ``. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:HExploitability: 2.8 | Impact: 6.0
Affected Packages4 packages
🔴Vulnerability Details
4OSV
▶
GHSA
▶
OSV▶
CVE-2021-32797: JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook↗2021-08-09
CVEList
▶
📋Vendor Advisories
1Debian▶
CVE-2021-32797: jupyterlab - JupyterLab is a user interface for Project Jupyter which will eventually replace...↗2021