Severity | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE ID | CVE-2018-19351 CVE-2018-19352 |
CVSSv3 |
5.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C] 5.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C] |
CWE ID |
CWE-79 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Arch Linux |
Vulnerable software versions |
Arch Linux - |
Vendor URL | Arch Linux |
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in notebook/nbconvert/handlers.py. A remote attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
RemediationUpdate the affected package jupyter-notebook to version 5.7.2-1.
External linkshttps://security.archlinux.org/advisory/ASA-201812-1
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via a specially crafted directory name in notebook/static/tree/js/notebooklist.js. A remote attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
RemediationUpdate the affected package jupyter-notebook to version 5.7.2-1.
External linkshttps://security.archlinux.org/advisory/ASA-201812-1