CVE-2021-32797

NameCVE-2021-32797
DescriptionJupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html `<form>`. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
jupyterlab (PTS)sid, trixie4.0.11+ds1+~cs11.25.27-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
jupyterlabsource(unstable)(not affected)

Notes

- jupyterlab <not-affected> (Fixed before initial upload to Debian)
https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx

Search for package or bug name: Reporting problems