Lucene search

K
archlinuxArchLinuxASA-202108-10
HistoryAug 10, 2021 - 12:00 a.m.

[ASA-202108-10] jupyterlab: cross-site scripting

2021-08-1000:00:00
security.archlinux.org
112
jupyterlab
remote code execution
cross-site scripting
version 3.1.4

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

EPSS

0.004

Percentile

73.0%

Arch Linux Security Advisory ASA-202108-10

Severity: High
Date : 2021-08-10
CVE-ID : CVE-2021-32797
Package : jupyterlab
Type : cross-site scripting
Remote : Yes
Link : https://security.archlinux.org/AVG-2266

Summary

The package jupyterlab before version 3.1.4-1 is vulnerable to cross-
site scripting.

Resolution

Upgrade to 3.1.4-1.

pacman -Syu “jupyterlab>=3.1.4-1”

The problem has been fixed upstream in version 3.1.4.

Workaround

None.

Description

In JupyterLab before version 3.1.4, untrusted notebooks can execute
code on load. In particular JupyterLab doesn’t sanitize the action
attribute of the HTML <form> element. Using this it is possible to
trigger the form validation outside of the form itself. This is a
remote code execution, but requires user action to open a notebook.

Impact

An attacker could perform remote code execution using a maliciously
crafted notebook file.

References

https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx
https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed
https://security.archlinux.org/CVE-2021-32797

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyjupyterlab< 3.1.4-1UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

EPSS

0.004

Percentile

73.0%