Published November 8, 2019
Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG...
Full analysis pending. Showing NVD description excerpt.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| notebook | pip | < 5.5.0rc1 | 5.5.0rc1 |
Do you use notebook? You're affected.
Severity & Risk
CVSS 3.1
5.3 / 10
EPSS
0.4%
chance of exploitation in 30 days
KEV Status
Not in KEV
Sophistication
N/A
Recommended Action
Patch available
Update notebook to version 5.5.0rc1
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Technical Details
NVD Description
Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References
- github.com/advisories/GHSA-jqwc-jm56-wcwj
- github.com/jupyter/notebook/commit/e321c80776542b8d6f3411af16f9e21e51e27687
- github.com/jupyter/notebook/pull/3341
- github.com/jupyter/notebook/releases/tag/5.5.0
- github.com/pypa/advisory-database/tree/main/vulns/notebook/PYSEC-2019-157.yaml
- lists.debian.org/debian-lts-announce/2020/11/msg00033.html
- nvd.nist.gov/vuln/detail/CVE-2018-21030
Timeline
Published
November 8, 2019
Last Modified
October 7, 2024
First Seen
March 24, 2026