CVE-2019-9644

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-9644
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-9644.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-9644
Aliases
Related
Published
2019-03-12T09:29:00Z
Modified
2024-10-12T05:25:33.615380Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An XSSI (cross-site inclusion) vulnerability in Jupyter Notebook before 5.7.6 allows inclusion of resources on malicious pages when visited by users who are authenticated with a Jupyter server. Access to the content of resources has been demonstrated with Internet Explorer through capturing of error messages, though not reproduced with other browsers. This occurs because Internet Explorer's error messages can include the content of any invalid JavaScript that was encountered.

References

Affected packages

Debian:11 / jupyter-notebook

Package

Name
jupyter-notebook
Purl
pkg:deb/debian/jupyter-notebook?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.7.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / jupyter-notebook

Package

Name
jupyter-notebook
Purl
pkg:deb/debian/jupyter-notebook?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.7.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / jupyter-notebook

Package

Name
jupyter-notebook
Purl
pkg:deb/debian/jupyter-notebook?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.7.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/jupyter/notebook

Affected ranges

Type
GIT
Repo
https://github.com/jupyter/notebook
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

4.*

4.0.0
4.0.1
4.1.0

5.*

5.0.0
5.0.0-rc.1
5.0.0b1
5.0.0b2
5.0.0rc2
5.1.0
5.1.0rc1
5.1.0rc2
5.1.0rc3
5.2.0
5.2.0rc1
5.3.0
5.3.0rc1
5.3.1
5.4.0
5.5.0
5.5.0rc1
5.6.0
5.6.0rc1
5.7.0
5.7.1
5.7.2
5.7.3
5.7.4
5.7.5