
CVE-2022-29238 – Forced Browsing in Jupyter Notebook
https://notcve.org/view.php?id=CVE-2022-29238
14 Jun 2022 — Jupyter Notebook is a web-based notebook environment for interactive computing. Prior to version 6.4.12, authenticated requests to the notebook server with `ContentsManager.allow_hidden = False` only prevented listing the contents of hidden directories, not accessing individual hidden files or files in hidden directories (i.e. hidden files were 'hidden' but not 'inaccessible'). This could lead to notebook configurations allowing authenticated access to files that may reasonably be expected to be disallowed.... • https://github.com/jupyter/notebook/security/advisories/GHSA-v7vq-3x77-87vg • CWE-425: Direct Request ('Forced Browsing') •

CVE-2022-24758 – Insertion of Sensitive Information into Log File affects Jupyter Notebook
https://notcve.org/view.php?id=CVE-2022-24758
31 Mar 2022 — The Jupyter notebook is a web-based notebook environment for interactive computing. Prior to version 6.4.9, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Jupyter notebook version 6.4.x contains a pa... • https://github.com/jupyter/notebook/security/advisories/GHSA-m87f-39q9-6f55 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2021-32798 – Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in notebook
https://notcve.org/view.php?id=CVE-2021-32798
09 Aug 2021 — The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs. • https://github.com/jupyter/notebook/commit/79fc76e890a8ec42f73a3d009e44ef84c14ef0d5 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •