The GitHub Security Lab discovered sixteen ways to exploit a cross-site scripting vulnerability in nbconvert. When using nbconvert to generate an HTML version of a user-controllable notebook, it is possible to inject arbitrary HTML which may lead to cross-site scripting (XSS) vulnerabilities if these HTML notebooks are served by a web server (eg: nbviewer).
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq | third party advisory exploit |
https://github.com/jupyter/nbviewer/security/advisories/GHSA-h274-fcvj-h2wm | broken link |
https://lists.debian.org/debian-lts-announce/2023/06/msg00003.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2024/09/msg00004.html |