First published: Mon Aug 09 2021(Updated: )
### Impact Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook. ### Patches Patched in the following versions: 3.1.4, 3.0.17, 2.3.2, 2.2.10, 1.2.21. ### References [OWASP Page on Restricting Form Submissions](https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html) ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org. Credit: Guillaume Jeanne from Google
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jupyter Jupyterlab | <1.2.21 | |
Jupyter Jupyterlab | >=2.0.0<2.2.10 | |
Jupyter Jupyterlab | >=2.3.0<2.3.2 | |
Jupyter Jupyterlab | >=3.0.0<3.0.17 | |
Jupyter Jupyterlab | >=3.1.0<3.1.4 | |
pip/jupyterlab | >=3.1.0a0<3.1.4 | 3.1.4 |
pip/jupyterlab | >=3.0.0a0<3.0.17 | 3.0.17 |
pip/jupyterlab | >=2.3.0a0<2.3.2 | 2.3.2 |
pip/jupyterlab | >=2.0.0a0<2.2.10 | 2.2.10 |
pip/notebook | >=6.0.0<6.4.1 | 6.4.1 |
pip/notebook | <5.7.11 | 5.7.11 |
pip/jupyterlab | <1.2.21 | 1.2.21 |
<1.2.21 | ||
>=2.0.0<2.2.10 | ||
>=2.3.0<2.3.2 | ||
>=3.0.0<3.0.17 | ||
>=3.1.0<3.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32797 is a vulnerability in JupyterLab that allows untrusted notebooks to execute code on load.
CVE-2021-32797 affects JupyterLab versions up to 1.2.21, 2.0.0 to 2.2.10, 2.3.0 to 2.3.2, 3.0.0 to 3.0.17, and 3.1.0 to 3.1.4.
CVE-2021-32797 has a severity rating of 9.6, which is classified as critical.
The CVE-2021-32797 vulnerability can be exploited by using an untrusted notebook to trigger the execution of code on load in JupyterLab.
The Common Weakness Enumeration (CWE) ID for CVE-2021-32797 is CWE-79.