Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPostHandler do not set a Content Security Policy to prevent this.
References
Link | Resource |
---|---|
https://pypi.org/project/notebook/#history | Third Party Advisory |
https://groups.google.com/forum/#!topic/jupyter/hWzu2BSsplY | Issue Tracking Third Party Advisory |
https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491 | Patch Third Party Advisory |
https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst | Release Notes |
https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html |
Configurations
Information
Published : 2018-11-18 09:29
Updated : 2020-11-18 23:15
NVD link : CVE-2018-19351
Mitre link : CVE-2018-19351
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
jupyter
- notebook