notebook@4.3.0 vulnerabilities

Jupyter Notebook - A web-based notebook environment for interactive computing

Direct Vulnerabilities

Known vulnerabilities in the notebook package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Access Restriction Bypass

notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text.

Affected versions of this package are vulnerable to Access Restriction Bypass. When a fully authenticated request is sent to the notebook server which is configured with ContentsManager.allow_hidden = False, it is possible to access arbitrary hidden files or arbitrary files in hidden directories.

How to fix Access Restriction Bypass?

Upgrade notebook to version 6.4.12 or higher.

[,6.4.12)
  • H
Information Exposure

notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text.

Affected versions of this package are vulnerable to Information Exposure by storing sensitive authentication cookies and other header values whenever an HTTP 5XX error is triggered in the server logs by default.

How to fix Information Exposure?

Upgrade notebook to version 6.4.10 or higher.

[,6.4.10)
  • M
Cross-site Request Forgery (CSRF)

notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). HTML forms in Firefox do not send an Origin header, therefore it's possible to submit a POST request with an empty body to trigger certain actions, such as starting a kernel, avoiding the existing origin checks.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade notebook to version 4.3.1 or higher.

[,4.3.1)
  • H
Arbitrary Code Execution

notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text.

Affected versions of this package are vulnerable to Arbitrary Code Execution. An untrusted notebook can execute code on load due to failure of sanitizing special elements into a different plane.

How to fix Arbitrary Code Execution?

Upgrade notebook to version 5.7.11, 6.4.1 or higher.

[,5.7.11) [6.0.0,6.4.1)
  • M
Open Redirect

notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text.

Affected versions of this package are vulnerable to Open Redirect. It is possible to maliciously craft links can only be reasonably made for known notebook server hosts. This could be used to redirect to a spoofed server on the public internet.

How to fix Open Redirect?

Upgrade notebook to version 6.1.5 or higher.

[,6.1.5)
  • M
Cross-site Scripting (XSS)

notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.

How to fix Cross-site Scripting (XSS)?

Upgrade notebook to version 5.5.0 or higher.

[,5.5.0)
  • H
Remote Code Execution

notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text.

Affected versions of this package are vulnerable to Remote Code Execution. A maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.

How to fix Remote Code Execution?

Upgrade notebook to version 5.4.1 or higher.

[,5.4.1)
  • M
Open Redirect

notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text.

Affected versions of this package are vulnerable to Open Redirect via an empty netloc path. This issue exists because of an incomplete fix for CVE-2019-10255.

How to fix Open Redirect?

Upgrade notebook to version 5.7.8 or higher.

[,5.7.8)
  • M
Cross-site Scripting (XSS)

notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It allows crafted links to the login page, which will redirect to a malicious site after successful login. Servers running on a base_url prefix are not affected.

How to fix Cross-site Scripting (XSS)?

Upgrade notebook to version 5.7.7 or higher.

[,5.7.7)
  • M
Cross-site Inclusion

notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text.

Affected versions of this package are vulnerable to Cross-site Inclusion. This is due to the package allowing inclusion of resources on malicious pages when visited by users who are authenticated via a Jupyter server.

How to fix Cross-site Inclusion?

Upgrade notebook to version 5.7.6 or higher.

[,5.7.6)
  • M
Cross-site Scripting (XSS)

notebook is an open-source web application that allows you to create and share documents that contain live code, equations, visualizations and narrative text.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely.

How to fix Cross-site Scripting (XSS)?

Upgrade jupyter_notebook to version 5.7.2 or higher.

[,5.7.2)
  • M
Cross-site Scripting (XSS)

notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations, and explanatory text.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server.

How to fix Cross-site Scripting (XSS)?

Upgrade notebook to version 5.7.1 or higher.

[,5.7.1)
  • M
Cross-site Request Forgery (CSRF)

notebook is a web-based notebook environment for interactive computing.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) attacks due to improper validation of the CSRF token. A malicious user may be able to spawn new kernels and create empty, untitled files on the user's notebook server.

Note: This affects users of Firefox or Microsoft (IE, Edge) browsers, and any other browsers that do not set the Origin header on cross-site forms. WebKit and Blink based browsers like Safari and Chrome are not affected.

[,4.3.1)