First published: Wed Aug 25 2021(Updated: )
### Impact Due to an unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. ### Patches 0.10.2 ### Workarounds None, other than upgrade to 0.10.2 or downgrade to 0.8.x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [nbgitpuller](https://github.com/jupyterhub/nbgitpuller/issues) * Email our security team at [security@ipython.org](mailto:security@ipython.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jupyterhub Nbgitpuller | >=0.9.0<0.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39160 is a vulnerability in the nbgitpuller Jupyter server extension that allows for arbitrary code execution in the user environment when visiting maliciously crafted links.
CVE-2021-39160 has a severity score of 8.8 (critical).
CVE-2021-39160 allows for arbitrary code execution in the user environment when visiting malicious links.
To fix CVE-2021-39160, upgrade to version 0.10.2 of nbgitpuller or downgrade to version 0.8.x.
No, there are no workarounds for CVE-2021-39160 other than upgrading to version 0.10.2 or downgrading to version 0.8.x.