UBUNTU-CVE-2021-32798

Source
https://ubuntu.com/security/CVE-2021-32798
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-32798.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2021-32798
Upstream
Published
2021-08-09T21:15:00Z
Modified
2025-07-18T16:46:49Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N CVSS Calculator
  • 9.6 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.

References

Affected packages

Ubuntu:Pro:18.04:LTS / jupyter-notebook

Package

Name
jupyter-notebook
Purl
pkg:deb/ubuntu/jupyter-notebook@5.2.2-1ubuntu0.1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.2.3-4

5.*

5.1.0-2
5.2.1-2
5.2.2-1
5.2.2-1ubuntu0.1

Ubuntu:Pro:20.04:LTS / jupyter-notebook

Package

Name
jupyter-notebook
Purl
pkg:deb/ubuntu/jupyter-notebook@6.0.3-2ubuntu0.1?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.7.8-1

6.*

6.0.0-1
6.0.0-2
6.0.2-1
6.0.3-1
6.0.3-2
6.0.3-2ubuntu0.1