Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Jupyter Notebook and JupyterLab token theft via stored XSS in help command linker
Vulnerability Description
In Jupyter Notebook versions 7.0.0 through 7.5.5, JupyterLab versions 4.5.6 and earlier, and the corresponding @jupyter-notebook/help-extension and @jupyterlab/help-extension packages before 7.5.6 and 4.5.7, a stored cross-site scripting issue in the help command linker can be chained with attacker-controlled notebook content to steal authentication tokens with a single click. An attacker can craft a malicious notebook file containing elements that appear indistinguishable from legitimate controls and trigger execution when a user interacts with them. Successful exploitation allows theft of the user's authentication token and complete takeover of the Jupyter session through the REST API, including reading files, creating or modifying files, accessing kernels to execute arbitrary code, and creating terminals for shell access. This issue has been fixed in Notebook 7.5.6, JupyterLab 4.5.7, @jupyter-notebook/help-extension 7.5.6, and @jupyterlab/help-extension 4.5.7. As a workaround, disable the affected help extensions or set allowCommandLinker to false in the sanitizer configuration.
CVSS Information
N/A
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Jupyter多款产品 跨站脚本漏洞
Vulnerability Description
Jupyter Notebook是Project Jupyter开源的一套用于创建、共享代码和说明性文本文档的开源Web应用程序。JupyterLab是JupyterLab开源的一个用于交互式和可重复计算的可扩展环境,基于 Jupyter Notebook 和架构。 Jupyter多款产品存在跨站脚本漏洞,该漏洞源于帮助命令链接器存在存储型跨站脚本,可能导致攻击者通过恶意笔记本文件窃取身份验证令牌并完全接管Jupyter会话。以下产品及版本受到影响:Jupyter Notebook 7.0.0至7.5.5
CVSS Information
N/A
Vulnerability Type
N/A