Jupyter Notebook file bypasses sanitization, executes JavaScript
High severity
GitHub Reviewed
Published
Jul 12, 2018
to the GitHub Advisory Database
•
Updated Sep 27, 2024
Description
Published to the GitHub Advisory Database
Jul 12, 2018
Reviewed
Jun 16, 2020
Last updated
Sep 27, 2024
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
References