CVE-2018-8768: Jupyter Notebook file bypasses sanitization, executes JavaScript
(updated )
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is ‘fixed’ by jQuery after sanitization, making it dangerous.
References
Detect and mitigate CVE-2018-8768 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →