Name | CVE-2021-32798 |
Description | The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 992704 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
jupyter-notebook (PTS) | stretch (security), stretch (lts), stretch | 4.2.3-4+deb9u2 | vulnerable |
| buster | 5.7.8-1 | vulnerable |
| bullseye | 6.2.0-1 | vulnerable |
| bookworm | 6.4.12-2.2 | fixed |
| trixie | 6.4.13-3 | fixed |
| sid | 6.4.13-4 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bullseye] - jupyter-notebook <no-dsa> (Minor issue)
[buster] - jupyter-notebook <no-dsa> (Minor issue)
[stretch] - jupyter-notebook <no-dsa> (Minor issue)
https://github.com/jupyter/notebook/security/advisories/GHSA-hwvq-6gjx-j797
https://github.com/jupyter/notebook/commit/79fc76e890a8ec42f73a3d009e44ef84c14ef0d5