JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html `<form>`. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0107 JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html `<form>`. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.
Github GHSA Github GHSA GHSA-4952-p58q-6crx JupyterLab: XSS due to lack of sanitization of the action attribute of an html <form>
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-03T23:33:56.163Z

Reserved: 2021-05-12T00:00:00

Link: CVE-2021-32797

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-09T21:15:08.140

Modified: 2024-11-21T06:07:45.790

Link: CVE-2021-32797

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.