Vulnerability Description
JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html `<form>`. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jupyter | Jupyterlab | < 1.2.21 |
Related Weaknesses (CWE)
References
- https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830ExploitThird Party Advisory
- https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crxThird Party Advisory
- https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830ExploitThird Party Advisory
- https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crxThird Party Advisory
FAQ
What is CVE-2021-32797?
CVE-2021-32797 is a vulnerability with a CVSS score of 7.4 (HIGH). JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLa...
How severe is CVE-2021-32797?
CVE-2021-32797 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32797?
Check the references section above for vendor advisories and patch information. Affected products include: Jupyter Jupyterlab.