CVE-2021-32798 – notebook
Package
Manager: pip
Name: notebook
Vulnerable Version: >=0 <5.7.11 || >=6.0.0 <6.4.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
EPSS: 0.00787 pctl0.72961
Details
Special Element Injection in notebook ### Impact Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook. ### Patches 5.7.11, 6.4.1 ### References [OWASP Page on Injection Prevention](https://cheatsheetseries.owasp.org/cheatsheets/Injection_Prevention_Cheat_Sheet.html#injection-prevention-rules) ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org. Credit: Guillaume Jeanne from Google ### Example: A notebook with the following content in a cell and it would display an alert when opened for the first time in Notebook (in an untrusted state): ``` { "cell_type": "code", "execution_count": 0, "metadata": {}, "outputs": [ { "data": { "text/html": [ "<select><iframe></select><img src=x: onerror=alert('xss')>\n"], "text/plain": [] }, "metadata": {}, "output_type": "display_data" } ], "source": [ "" ] } ````
Metadata
Created: 2021-08-23T19:40:38Z
Modified: 2024-10-01T21:17:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-hwvq-6gjx-j797/GHSA-hwvq-6gjx-j797.json
CWE IDs: ["CWE-75", "CWE-79", "CWE-80"]
Alternative ID: GHSA-hwvq-6gjx-j797
Finding: F425
Auto approve: 1