Arch Linux update for jupyter-notebook

Published: 2018-12-07 10:02:00 | Updated: 2018-12-07
Severity Low
Patch available YES
Number of vulnerabilities 2
CVE ID CVE-2018-19351
CVE-2018-19352
CVSSv3 5.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
5.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CWE ID CWE-79
Exploitation vector Network
Public exploit N/A
Vulnerable software Arch Linux
Vulnerable software versions Arch Linux -
Vendor URL Arch Linux

Security Advisory

1) Cross-site scripting

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in notebook/nbconvert/handlers.py. A remote attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Remediation

Update the affected package jupyter-notebook to version 5.7.2-1.

External links

https://security.archlinux.org/advisory/ASA-201812-1

2) Cross-site scripting

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data passed via a specially crafted directory name in notebook/static/tree/js/notebooklist.js. A remote attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Remediation

Update the affected package jupyter-notebook to version 5.7.2-1.

External links

https://security.archlinux.org/advisory/ASA-201812-1

Back to List