
Cloud Vulnerability DB
A community-led vulnerabilities database
JupyterLab, a user interface for Project Jupyter, was found to contain a vulnerability where untrusted notebooks could execute code on load. The vulnerability (CVE-2021-32797) was discovered by Guillaume Jeanne from Google and affected all published versions of JupyterLab at the time the CVE was received. The core issue stemmed from JupyterLab's failure to properly sanitize the action attribute of HTML form tags, which could potentially lead to remote code execution (GitHub Advisory).
The vulnerability involves the improper sanitization of HTML form tags, specifically the action attribute. This security flaw allowed for triggering form validation outside of the form itself, potentially leading to code execution. The issue was addressed by removing the form tags' action attribute during sanitizing, as evidenced in the security patch (GitHub Commit). The vulnerability has been classified with CWE-75 and CWE-87 weaknesses (GitHub Advisory).
The vulnerability could allow remote code execution (RCE) when a user opens a malicious notebook. While this represents a significant security risk, it's important to note that the exploit requires user interaction to open the compromised notebook (GitHub Advisory).
The vulnerability has been patched in multiple versions of JupyterLab: 3.1.4, 3.0.17, 2.3.2, 2.2.10, and 1.2.21. Users are advised to upgrade to these patched versions or later to mitigate the security risk (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."