9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
71.8%
Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook.
Patched in the following versions: 3.1.4, 3.0.17, 2.3.2, 2.2.10, 1.2.21.
OWASP Page on Restricting Form Submissions
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [email protected].
Credit: Guillaume Jeanne from Google
CPE | Name | Operator | Version |
---|---|---|---|
notebook | lt | 6.4.1 | |
notebook | lt | 5.7.11 | |
jupyterlab | lt | 3.1.4 | |
jupyterlab | lt | 3.0.17 | |
jupyterlab | lt | 2.3.2 | |
jupyterlab | lt | 2.2.10 | |
jupyterlab | lt | 1.2.21 |
github.com/advisories/GHSA-4952-p58q-6crx
github.com/google/security-research/security/advisories/GHSA-c469-p3jp-2vhx
github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed
github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx
nvd.nist.gov/vuln/detail/CVE-2021-32797
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
71.8%