Ubuntu update for jupyter-notebook



Published: 2022-08-30
Risk Medium
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2018-19351
CVE-2018-21030
CVE-2019-10255
CVE-2019-10856
CVE-2019-9644
CVE-2020-26215
CVE-2022-24758
CVE-2022-29238
CWE-ID CWE-79
CWE-254
CWE-601
CWE-532
CWE-425
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Ubuntu
Operating systems & Components / Operating system

python-notebook (Ubuntu package)
Operating systems & Components / Operating system package or component

jupyter-notebook (Ubuntu package)
Operating systems & Components / Operating system package or component

python3-notebook (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) Cross-site scripting

EUVDB-ID: #VU15943

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-19351

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in notebook/nbconvert/handlers.py. A remote attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Update the affected package jupyter-notebook to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-notebook (Ubuntu package): before 5.2.2-1ubuntu0.1

jupyter-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

python3-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5585-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Security features bypass

EUVDB-ID: #VU66861

Risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-21030

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote user to perform XSS attacks.

The vulnerability exists due to application does not use a CSP header to treat served files as belonging to a separate origin. A remote user can upload an SVG file with XSS payload and execute arbitrary JavaScript code in victim's browser.

Mitigation

Update the affected package jupyter-notebook to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-notebook (Ubuntu package): before 5.2.2-1ubuntu0.1

jupyter-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

python3-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5585-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Open redirect

EUVDB-ID: #VU66862

Risk: Low

CVSSv3.1: 3 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-10255

CWE-ID: CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')

Exploit availability: No

Description

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.

Mitigation

Update the affected package jupyter-notebook to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-notebook (Ubuntu package): before 5.2.2-1ubuntu0.1

jupyter-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

python3-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5585-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Open redirect

EUVDB-ID: #VU66864

Risk: Low

CVSSv3.1: 3 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-10856

CWE-ID: CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')

Exploit availability: No

Description

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.

Note, the vulnerability exists due to incomplete fix for #VU66862 (CVE-2019-10255).

Mitigation

Update the affected package jupyter-notebook to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-notebook (Ubuntu package): before 5.2.2-1ubuntu0.1

jupyter-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

python3-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5585-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Cross-site scripting

EUVDB-ID: #VU66863

Risk: Medium

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-9644

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Update the affected package jupyter-notebook to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-notebook (Ubuntu package): before 5.2.2-1ubuntu0.1

jupyter-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

python3-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5585-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Open redirect

EUVDB-ID: #VU48652

Risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-26215

CWE-ID: CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')

Exploit availability: No

Description

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.

Mitigation

Update the affected package jupyter-notebook to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-notebook (Ubuntu package): before 5.2.2-1ubuntu0.1

jupyter-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

python3-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5585-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Inclusion of Sensitive Information in Log Files

EUVDB-ID: #VU66865

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24758

CWE-ID: CWE-532 - Information Exposure Through Log Files

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files, such as authentication cookies and header values when a 5xx error is triggered. A local user can read the log files and gain access to sensitive data.

Mitigation

Update the affected package jupyter-notebook to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-notebook (Ubuntu package): before 5.2.2-1ubuntu0.1

jupyter-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

python3-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5585-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Direct Request ('Forced Browsing')

EUVDB-ID: #VU64595

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-29238

CWE-ID: CWE-425 - Direct Request ('Forced Browsing')

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to improper access control. A remote user can send a specially crafted request with "ContentsManager.allow_hidden = False" and gain unauthorized access to sensitive information on the system.

Mitigation

Update the affected package jupyter-notebook to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-notebook (Ubuntu package): before 5.2.2-1ubuntu0.1

jupyter-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

python3-notebook (Ubuntu package): before 6.4.8-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5585-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###