漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
nbconvert has an Arbitrary File Write via Path Traversal in Cell Attachment Filenames
Vulnerability Description
The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions 6.5 through 7.17.0 allow arbitrary file writes to locations outside the intended output directory when processing notebooks containing crafted cell attachment filenames. The `ExtractAttachmentsPreprocessor` passes attachment filenames directly to the filesystem without sanitization, enabling path traversal attacks. This vulnerability provides complete control over both the destination path and file extension. Version 7.17.1 contains a patch.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
nbconvert 路径遍历漏洞
Vulnerability Description
nbconvert是Jupyter组织的一个格式转换库。将 Jupyter .ipynb 笔记本文档文件转换为另一种静态格式,包括 HTML、LaTeX、PDF、Markdown 等。 nbconvert 6.5版本至7.17.0版本存在路径遍历漏洞,该漏洞源于ExtractAttachmentsPreprocessor对附件文件名清理不当,可能导致任意文件写入。
CVSS Information
N/A
Vulnerability Type
N/A