oss-sec mailing list archives
CVE request: maliciously crafted notebook files in Jupyter
From: Thomas Kluyver <thomas () kluyver me uk>
Date: Thu, 15 Mar 2018 13:55:59 +0000
Email address of requester: security () ipython org, thomas () kluyver me uk, benjaminrk () gmail com, jkamens ()
quantopian com, ssanderson () quantopian com
Software name: Jupyter Notebook (formerly IPython Notebook)
Type of vulnerability: Maliciously forged file
Attack outcome: Possible remote execution
Vulnerability: A maliciously forged notebook file can bypass sanitization to execute Javascript in the notebook
context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
Affected versions:
- notebook ≤ 5.4.0
URI with issues:
- GET /notebook/**
Patches: not yet finalised
Mitigations:
Upgrade to Jupyter notebook 5.4.1 or 5.5 once available.
If using pip,
pip install --upgrade notebook
For conda:
conda update conda
conda update notebook
Vulnerability reported by vkgonka () mail ru , via Jonathan Kamens at Quantopian
Current thread:
- CVE request: maliciously crafted notebook files in Jupyter Thomas Kluyver (Mar 15)
- Re: CVE request: maliciously crafted notebook files in Jupyter Salvatore Bonaccorso (Mar 17)
- Re: CVE request: maliciously crafted notebook files in Jupyter Thomas Kluyver (Mar 18)
- Re: CVE request: maliciously crafted notebook files in Jupyter Fernando Perez (Mar 19)
- Re: CVE request: maliciously crafted notebook files in Jupyter Thomas Kluyver (Mar 18)
- Re: CVE request: maliciously crafted notebook files in Jupyter Ricter Zheng (Mar 19)
- Re: CVE request: maliciously crafted notebook files in Jupyter Gordo Lowrey (Mar 20)
- Re: CVE request: maliciously crafted notebook files in Jupyter Salvatore Bonaccorso (Mar 17)
