Security restrictions bypass in Jupyter Notebook - CVE-2018-8768
Published: April 24, 2018 / Updated: August 30, 2022
Vulnerability identifier: #VU12114
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2018-8768
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Jupyter
Affected software:
Jupyter Notebook
Jupyter Notebook
Detailed vulnerability description
The vulnerability allows a remote unauthenticated attacker to execute arbitrary code with elevated privileges on the target system.
The weakness exists due improper sanitization of notebook files. The jQuery component fixes invalid HTML after sanitization. A remote attacker can trick the victim into opening a specially crafted notebook file, execute arbitrary JavaScript code with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due improper sanitization of notebook files. The jQuery component fixes invalid HTML after sanitization. A remote attacker can trick the victim into opening a specially crafted notebook file, execute arbitrary JavaScript code with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
How to mitigate CVE-2018-8768
Update to version 5.4.1.