tlkh/transformers-benchmarking

CVE-2021-32798 (Critical) detected in notebook-5.7.10-py2.py3-none-any.whl

mend-bolt-for-github opened this issue · 0 comments

CVE-2021-32798 - Critical Severity Vulnerability

Vulnerable Library - notebook-5.7.10-py2.py3-none-any.whl

A web-based notebook environment for interactive computing

Library home page: https://files.pythonhosted.org/packages/7a/fb/6b1735e8ff43f68e867928526134cd6ba22554d596862a7fe71092ba8fc8/notebook-5.7.10-py2.py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy:

  • streamlit-0.55.2-py2.py3-none-any.whl (Root Library)
    • pydeck-0.5.0-py2.py3-none-any.whl
      • ipywidgets-7.5.1-py2.py3-none-any.whl
        • widgetsnbextension-3.5.1-py2.py3-none-any.whl
          • notebook-5.7.10-py2.py3-none-any.whl (Vulnerable Library)

Found in base branch: main

Vulnerability Details

The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.

Publish Date: 2021-08-09

URL: CVE-2021-32798

CVSS 3 Score Details (9.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-hwvq-6gjx-j797

Release Date: 2021-08-09

Fix Resolution (notebook): 5.7.11

Direct dependency fix Resolution (streamlit): 0.56.0


Step up your Open Source Security Game with Mend here