CVE-2018-19351
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPostHandler do not set a Content Security Policy to prevent this.
Jupyter Notebook en versiones anteriores a la 5.7.1 permite Cross-Site Scripting (XSS) mediante un notebook no fiable debido a que se considera que las respuestas nbconvert tienen el mismo origen que el servidor notebook. En otras palabras, los endpoints nbconvert pueden ejecutar JavaScript con acceso a la API del servidor. En notebook/nbconvert/handlers.py, NbconvertFileHandler y NbconvertPostHandler no establecen una polĂtica de seguridad del contenido (CSP) para evitarlo.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-11-18 CVE Reserved
- 2018-11-18 CVE Published
- 2024-08-05 CVE Updated
- 2024-09-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst | Release Notes | |
https://groups.google.com/forum/#%21topic/jupyter/hWzu2BSsplY | X_refsource_misc | |
https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html | Mailing List | |
https://pypi.org/project/notebook/#history | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491 | 2023-11-07 |
URL | Date | SRC |
---|