CVE-2021-39160

nbgitpuller is a Jupyter server extension to sync a git repository one-way to a local path. Due to unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. This has been resolved in version 0.10.2 and all users are advised to upgrade. No work around exist for users who can not upgrade.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jupyterhub:nbgitpuller:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:18

Type Values Removed Values Added
References () https://github.com/jupyterhub/nbgitpuller/blob/main/CHANGELOG.md#0102---2021-08-25 - Release Notes, Third Party Advisory () https://github.com/jupyterhub/nbgitpuller/blob/main/CHANGELOG.md#0102---2021-08-25 - Release Notes, Third Party Advisory
References () https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481 - Patch, Third Party Advisory () https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481 - Patch, Third Party Advisory
References () https://github.com/jupyterhub/nbgitpuller/security/advisories/GHSA-mq5p-2mcr-m52j - Third Party Advisory () https://github.com/jupyterhub/nbgitpuller/security/advisories/GHSA-mq5p-2mcr-m52j - Third Party Advisory
CVSS v2 : 6.8
v3 : 8.8
v2 : 6.8
v3 : 9.6

Information

Published : 2021-08-25 18:15

Updated : 2024-11-21 06:18


NVD link : CVE-2021-39160

Mitre link : CVE-2021-39160

CVE.ORG link : CVE-2021-39160


JSON object : View

Products Affected

jupyterhub

  • nbgitpuller
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')