Lucene search

K
cveGitHub_MCVE-2021-32797
HistoryAug 09, 2021 - 9:15 p.m.

CVE-2021-32797

2021-08-0921:15:08
CWE-79
GitHub_M
web.nvd.nist.gov
75
4
jupyterlab
cve-2021-32797
project jupyter
remote code execution
html form vulnerability

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.004

Percentile

73.0%

JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html <form>. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.

Affected configurations

Nvd
Vulners
Node
jupyterjupyterlabRange<1.2.21
OR
jupyterjupyterlabRange2.0.02.2.10
OR
jupyterjupyterlabRange2.3.02.3.2
OR
jupyterjupyterlabRange3.0.03.0.17
OR
jupyterjupyterlabRange3.1.03.1.4
VendorProductVersionCPE
jupyterjupyterlab*cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "jupyterlab",
    "vendor": "jupyterlab",
    "versions": [
      {
        "status": "affected",
        "version": ">= 3.1.0, < 3.1.4"
      },
      {
        "status": "affected",
        "version": ">= 3.0.0, < 3.0.17"
      },
      {
        "status": "affected",
        "version": ">= 2.3.0, < 2.3.2"
      },
      {
        "status": "affected",
        "version": ">= 2.0.0, < 2.2.10"
      },
      {
        "status": "affected",
        "version": "< 1.2.1"
      }
    ]
  }
]

Social References

More

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.004

Percentile

73.0%