First published: Sun Mar 18 2018(Updated: )
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jupyter Notebook | <5.4.1 | |
pip/notebook | <5.4.1 | 5.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8768 is a vulnerability in Jupyter Notebook before version 5.4.1 that allows a maliciously forged notebook file to execute JavaScript in the notebook context.
CVE-2018-8768 works by bypassing sanitization in Jupyter Notebook, allowing invalid HTML to be executed as JavaScript.
The severity of CVE-2018-8768 is high with a severity value of 7.8.
Jupyter Notebook versions up to and excluding 5.4.1 are affected by CVE-2018-8768.
To fix CVE-2018-8768, it is recommended to upgrade Jupyter Notebook to version 5.4.1 or newer.