Description JupyterLab: XSS due to lack of sanitization of the action attribute of an html (CVE-2021-32797) Details JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html . Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook. Reason for inclusion in AVID: CVE-2021-32797 describes a software vulnerability (XSS leading to remote code execution) in JupyterLab, a core UI/tooling used in ML workflows. This affects a component commonly used to build, run, and deploy AI systems, representing a software supply-chain issue within AI stacks (not hardware/firmware). The report provides CVE details and references, indicating a security vulnerability with actionable impact. References NVD entry https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed Affected or Relevant Artifacts Developer: jupyterlab Deployer: jupyterlab Artifact Details: Type Name System jupyterlab Impact AVID Taxonomy Categorization Risk domains: Security SEP subcategories: S0100: Software Vulnerability Lifecycle stages: L06: Deployment CVSS Version3.1 Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N Base Score7.4 Base Severity🔴 High Attack VectorNETWORK Attack Complexity🟢 Low Privileges RequiredNONE User InteractionREQUIRED ScopeCHANGED Confidentiality Impact🔴 High Integrity ImpactNONE Availability ImpactNONE CWE ID Description CWE-79 CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) Other information Report Type: Advisory Credits: Date Reported: 2021-08-09 Version: 0.3.3 AVID Entry