https://bugzilla.suse.com/show_bug.cgi?id=1196663 Bug ID: 1196663 Summary: VUL-0: CVE-2021-32797: python-jupyterlab: untrusted notebook can execute on load which could lead to an RCE Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.4 Hardware: Other URL: https://smash.suse.de/issue/306082/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: security-team@suse.de Reporter: gabriele.sonnu@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn���t sanitize the action attribute of html `<form>`. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook. References: https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-... https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d52930... References: https://bugzilla.redhat.com/show_bug.cgi?id=2046370 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32797 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32797 https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d52930... https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-... -- You are receiving this mail because: You are on the CC list for the bug.