{"id":"PYSEC-2018-57","details":"In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.","aliases":["CVE-2018-8768","GHSA-6cwv-x26c-w2q4"],"modified":"2023-11-08T04:00:29.830061Z","published":"2018-03-18T06:29:00Z","references":[{"type":"WEB","url":"http://openwall.com/lists/oss-security/2018/03/15/2"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-6cwv-x26c-w2q4"}],"affected":[{"package":{"name":"notebook","ecosystem":"PyPI","purl":"pkg:pypi/notebook"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.1"}]}],"versions":["0.0.0","4.0.0","4.0.1","4.0.2","4.0.4","4.0.5","4.0.6","4.1.0","4.2.0","4.2.0b1","4.2.1","4.2.2","4.2.3","4.3.0","4.3.1","4.3.2","4.4.0","4.4.1","5.0.0","5.0.0b1","5.0.0b2","5.0.0rc1","5.0.0rc2","5.1.0","5.1.0rc1","5.1.0rc2","5.1.0rc3","5.2.0","5.2.0rc1","5.2.1","5.2.1rc1","5.2.2","5.3.0","5.3.0rc1","5.3.1","5.4.0"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/notebook/PYSEC-2018-57.yaml"}}],"schema_version":"1.7.3"}