Safety vulnerability ID: 41707
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Jupyterlab versions 3.1.4, 3.0.17, 2.3.2, 2.2.10 and 1.2.21 include a fix for CVE-2021-32797: In affected versions, an untrusted notebook can execute code on load. In particular, jupyterlab doesn’t sanitize the action attribute of html "<form>". Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.
https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx
https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed
Latest version: 4.3.3
JupyterLab computational environment
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application