Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2021-41134
November 03, 2021
nbdime provides tools for diffing and merging of Jupyter Notebooks. In affected versions a stored cross-site scripting (XSS) issue exists within the Jupyter-owned nbdime project. It appears that when reading the file name and path from disk, the extension does not sanitize the string it constructs before returning it to be displayed. The diffNotebookCheckpoint function within nbdime causes this issue. When attempting to display the name of the local notebook (diffNotebookCheckpoint), nbdime appears to simply append .ipynb to the name of the input file. The NbdimeWidget is then created, and the base string is passed through to the request API function. From there, the frontend simply renders the HTML tag and anything along with it. Users are advised to patch to the most recent version of the affected product.
Affected Packages
nbdime (NPM):
Affected version(s) >=0.4.0 <5.0.2
Fix Suggestion:
Update to version 5.0.2
nbdime-jupyterlab (NPM):
Affected version(s) >=0.1.0 <1.0.1
Fix Suggestion:
Update to version 1.0.1
nbdime (NPM):
Affected version(s) >=6.0.0 <6.1.2
Fix Suggestion:
Update to version 6.1.2
nbdime-jupyterlab (NPM):
Affected version(s) >=2.0.0 <2.1.1
Fix Suggestion:
Update to version 2.1.1
nbdime (PYTHON):
Affected version(s) >=0.1.0b1 <1.1.1
Fix Suggestion:
Update to version 1.1.1
nbdime (PYTHON):
Affected version(s) >=3.0.0 <3.1.1
Fix Suggestion:
Update to version 3.1.1
nbdime (PYTHON):
Affected version(s) >=2.0.0 <2.1.1
Fix Suggestion:
Update to version 2.1.1
Do you need more information?
Contact Us
CVSS v4
Base Score:
9.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
PASSIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
NONE
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
NONE
CVSS v3
Base Score:
8.7
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE
CVSS v2
Base Score:
3.5
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
EPSS
Base Score:
0.34