Lucene search

K
githubGitHub Advisory DatabaseGHSA-92MR-V722-F48M
HistoryMay 17, 2022 - 3:25 a.m.

Improper Input Validation in Jupyter Notebook

2022-05-1703:25:49
CWE-20
GitHub Advisory Database
github.com
6

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

87.1%

The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.

Affected configurations

Vulners
Node
ipythonipythonRange3.2.1
OR
ipythonipython_notebookRange4.0.4
CPENameOperatorVersion
ipythonle3.2.1
notebookle4.0.4

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

87.1%