JupyterLab: XSS due to lack of sanitization of the action attribute of an html <form>
CVE-2021-32797

7.4HIGH

Key Information:

Vendor

Jupyterlab

Vendor
CVE Published:
9 August 2021

What is CVE-2021-32797?

JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html <form>. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

jupyterlab >= 3.1.0, < 3.1.4 < 3.1.0, 3.1.4

jupyterlab >= 3.0.0, < 3.0.17 < 3.0.0, 3.0.17

jupyterlab >= 2.3.0, < 2.3.2 < 2.3.0, 2.3.2

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.