Bug ID | 1196663 |
---|---|
Summary | VUL-0: CVE-2021-32797: python-jupyterlab: untrusted notebook can execute on load which could lead to an RCE |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.4 |
Hardware | Other |
URL | https://smash.suse.de/issue/306082/ |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | security-team@suse.de |
Reporter | gabriele.sonnu@suse.com |
QA Contact | security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn���������t sanitize the action attribute of html `<form>`. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook. References: https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed References: https://bugzilla.redhat.com/show_bug.cgi?id=2046370 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32797 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32797 https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx