In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
References
Link | Resource |
---|---|
http://openwall.com/lists/oss-security/2018/03/15/2 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html | |
http://openwall.com/lists/oss-security/2018/03/15/2 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html |
Configurations
History
21 Nov 2024, 04:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://openwall.com/lists/oss-security/2018/03/15/2 - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html - |
Information
Published : 2018-03-18 06:29
Updated : 2024-11-21 04:14
NVD link : CVE-2018-8768
Mitre link : CVE-2018-8768
CVE.ORG link : CVE-2018-8768
JSON object : View
Products Affected
jupyter
- notebook
CWE