CVE-2018-8768: Jupyter Notebook file bypasses sanitization, executes JavaScript
(updated )
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is ‘fixed’ by jQuery after sanitization, making it dangerous.
References
Code Behaviors & Features
Detect and mitigate CVE-2018-8768 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →