MGASA-2022-0323

Source
https://advisories.mageia.org/MGASA-2022-0323.html
Import Source
https://advisories.mageia.org/MGASA-2022-0323.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0323
Related
Published
2022-09-10T20:26:43Z
Modified
2022-09-10T19:33:59Z
Summary
Updated jupyter-notebook packages fix security vulnerability
Details

It was discovered that Jupyter Notebook incorrectly handled certain notebooks. An attacker could possibly use this issue of lack of Content Security Policy in Nbconvert to perform cross-site scripting (XSS) attacks on the notebook server. (CVE-2018-19351)

It was discovered that Jupyter Notebook incorrectly handled certain SVG documents. An attacker could possibly use this issue to perform cross-site scripting (XSS) attacks. (CVE-2018-21030)

It was discovered that Jupyter Notebook incorrectly filtered certain URLs on the login page. An attacker could possibly use this issue to perform open-redirect attack. (CVE-2019-10255)

It was discovered that Jupyter Notebook had an incomplete fix for CVE-2019-10255. An attacker could possibly use this issue to perform open-redirect attack using empty netloc. (CVE-2019-10856)

It was discovered that Jupyter Notebook incorrectly handled the inclusion of remote pages on Jupyter server. An attacker could possibly use this issue to perform cross-site script inclusion (XSSI) attacks. (CVE-2019-9644)

It was discovered that Jupyter Notebook incorrectly filtered certain URLs to a notebook. An attacker could possibly use this issue to perform open-redirect attack. (CVE-2020-26215)

It was discovered that Jupyter Notebook server access logs were not protected. An attacker having access to the notebook server could possibly use this issue to get access to steal sensitive information such as auth/cookies. (CVE-2022-24758)

It was discovered that Jupyter Notebook incorrectly configured hidden files on the server. An authenticated attacker could possibly use this issue to see unwanted sensitive hidden files from the server which may result in getting full access to the server. (CVE-2022-29238)

Moment.js: Path traversal in moment.locale (CVE-2022-24785)

moment: inefficient parsing algorithim resulting in DoS (CVE-2022-31129)

References
Credits

Affected packages

Mageia:8 / jupyter-notebook

Package

Name
jupyter-notebook
Purl
pkg:rpm/mageia/jupyter-notebook?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.4.12-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / python-send2trash

Package

Name
python-send2trash
Purl
pkg:rpm/mageia/python-send2trash?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.0-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / python-nest-asyncio

Package

Name
python-nest-asyncio
Purl
pkg:rpm/mageia/python-nest-asyncio?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.5-1.mga8

Ecosystem specific

{
    "section": "core"
}