CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
25.0%
The GitHub Security Lab discovered sixteen ways to exploit a cross-site
scripting vulnerability in nbconvert. When using nbconvert to generate an
HTML version of a user-controllable notebook, it is possible to inject
arbitrary HTML which may lead to cross-site scripting (XSS) vulnerabilities
if these HTML notebooks are served by a web server (eg: nbviewer).
Author | Note |
---|---|
ccdm94 | all commits that patch this issue can be seen by comparing nbconvert version 6.5.0 and version 6.5.1. (see: https://github.com/jupyter/nbconvert/compare/6.5.0...6.5.1) |
github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq
github.com/jupyter/nbviewer/security/advisories/GHSA-h274-fcvj-h2wm
launchpad.net/bugs/cve/CVE-2021-32862
nvd.nist.gov/vuln/detail/CVE-2021-32862
security-tracker.debian.org/tracker/CVE-2021-32862
www.cve.org/CVERecord?id=CVE-2021-32862