id stringlengths 36 36 | code_before large_stringlengths 69 1.06k | code_after large_stringlengths 0 1.02k | description large_stringclasses 7
values | cve large_stringclasses 4
values | programming_language large_stringclasses 1
value | cwe listlengths 0 2 |
|---|---|---|---|---|---|---|
e9b31d7b-8af3-48b2-a73f-3c329e91d5a5 | tooltipText: (c: FormatterContext, d: BarChartDatum, e: string) => string;
} | ) => TooltipContent;
} | Description
Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion.
Proof of Concept
Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/.
Filter on conversion type and ... | TypeScript | [] | |
e1376893-4ce6-4c5e-9dcc-a3cce0dc27e1 | text += ` / ${c.amount(a.budget, a.currency)}`;
}
text += "<br>";
});
} else { | ? `${c.amount(a.value, a.currency)} / ${c.amount(
a.budget,
a.currency
)}`
: c.amount(a.value, a.currency)
)
);
content.push(domHelpers.br());
});
} else { | Description
Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion.
Proof of Concept
Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/.
Filter on conversion type and ... | TypeScript | [] | |
84243f60-0042-40f6-85ed-bce0f11a4666 | text += `${c.amount(value, a.currency)}<br>`;
});
} | ? `${c.amount(a.value, a.currency)} / ${c.amount(
a.budget,
a.currency
)}`
: c.amount(a.value, a.currency)
)
);
content.push(domHelpers.br());
});
} else { | Description
Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion.
Proof of Concept
Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/.
Filter on conversion type and ... | TypeScript | [] | |
e80ee3c3-7b54-4c85-8073-e68f2379ba63 | `${c.amount(d.value, d.name)}<em>${day(d.date)}</em>`,
});
}
| Description
Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion.
Proof of Concept
Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/.
Filter on conversion type and ... | TypeScript | [] | ||
2256a076-2635-48b1-baff-8734da3448d7 | return `1 ${base} = ${c.amount(d.value, quote)}<em>${day(d.date)}</em>`;
},
});
}
| Description
Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion.
Proof of Concept
Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/.
Filter on conversion type and ... | TypeScript | [] | ||
e600b8de-b67e-4aa7-ab1c-47bbe3ad3679 | node.addEventListener("mouseenter", () => {
const t = tooltip();
t.innerHTML = getter();
});
node.addEventListener("mousemove", followMouse); | node.addEventListener("mouseenter", () => {
const t = tooltip();
t.replaceChildren(...getter());
});
node.addEventListener("mousemove", followMouse); | Description
Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion.
Proof of Concept
Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/.
Filter on conversion type and ... | TypeScript | [] | |
bb3b57fa-46af-4a53-9585-2fd4641bde6e | const matrix = node.getScreenCTM();
if (res && matrix) {
const [x, y, content] = res;
const t = tooltip();
t.style.opacity = "1";
t.innerHTML = content;
t.style.left = `${window.scrollX + x + matrix.e}px`;
t.style.top = `${window.scrollY + y + matrix.f - 15}px`;
} else {
... | const matrix = node.getScreenCTM();
if (res && matrix) {
const [x, y, content] = res;
const t = tooltip();
t.style.opacity = "1";
t.replaceChildren(...content);
t.style.left = `${window.scrollX + x + matrix.e}px`;
t.style.top = `${window.scrollY + y + matrix.f - 15}px`;
}... | Description
Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion.
Proof of Concept
Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/.
Filter on conversion type and ... | TypeScript | [] | |
5e7f8cea-0167-41cc-8f99-d1ec519b4486 | export function initSidebar(): void {
const errorCountEl = document.getElementById("error-count");
if (errorCountEl instanceof HTMLLIElement) {
errorCount.subscribe((errorCount_val) => {
errorCountEl.classList.toggle("hidden", errorCount_val === 0);
const span = errorCountEl.querySelector("span");
... | export function initSidebar(): void {
const errorCountEl = document.getElementById("error-count");
if (errorCountEl instanceof HTMLLIElement) {
errorCount.subscribe((errorCount_val) => {
errorCountEl.classList.toggle("hidden", errorCount_val === 0);
const span = errorCountEl.querySelector("span");
... | Description
Fava v1.22 have a conversion filter function on income statement dashboard which allow user to perform XSS due to improper validation on filter conversion.
Proof of Concept
Navigate to Fava demo instance https://fava.pythonanywhere.com/example-beancount-file/income_statement/.
Filter on conversion type and ... | TypeScript | [] | |
f9f807d1-a6ce-4e3f-9f34-17b9a24be4ff | const onHeadingsChanged = () => {
if (!this.parser) {
return;
}
// Clear all numbering items
TableOfContentsUtils.clearNumbering(widget.content.node);
// Create a new mapping
headingToElement = new WeakMap<IMarkdownViewerHeading, Element | null>();
model.headings.... | const onHeadingsChanged = () => {
if (!this.parser) {
return;
}
// Clear all numbering items
TableOfContentsUtils.clearNumbering(widget.content.node);
// Create a new mapping
headingToElement = new WeakMap<IMarkdownViewerHeading, Element | null>();
model.headings.... | jupyterlab is a JupyterLab computational environment.
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Markdown Preview feature. An attacker can access any data that the attacked user has access to, as well as perform arbitrary requests acting as the attacked user by opening a mali... | CVE-2024-22420 | TypeScript | [
"CWE-79"
] |
c1802fb8-6b0a-4485-9793-8ee84b5d2fc6 | export async function getIdForHeading(
heading: INotebookHeading,
parser: IRenderMime.IMarkdownParser
) {
let elementId: string | null = null;
if (heading.type === Cell.HeadingType.Markdown) {
elementId = await TableOfContentsUtils.Markdown.getHeadingId(
parser,
// Type from TableOfContentsUtils... | export async function getIdForHeading(
heading: INotebookHeading,
parser: IRenderMime.IMarkdownParser,
sanitizer: IRenderMime.ISanitizer
) {
let elementId: string | null = null;
if (heading.type === Cell.HeadingType.Markdown) {
elementId = await TableOfContentsUtils.Markdown.getHeadingId(
parser,
... | jupyterlab is a JupyterLab computational environment.
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Markdown Preview feature. An attacker can access any data that the attacked user has access to, as well as perform arbitrary requests acting as the attacked user by opening a mali... | CVE-2024-22420 | TypeScript | [
"CWE-79"
] |
30baaa04-e13a-4ca0-ab24-c5fcaa42d3de | const findHeadingElement = (cell: Cell): void => {
model.getCellHeadings(cell).forEach(async heading => {
const elementId = await getIdForHeading(heading, this.parser!);
const selector = elementId
? `h${heading.level}[id="${elementId}"]`
: `h${heading.level}`;
if ... | const findHeadingElement = (cell: Cell): void => {
model.getCellHeadings(cell).forEach(async heading => {
const elementId = await getIdForHeading(
heading,
this.parser!,
this.sanitizer
);
const selector = elementId
? `h${heading.level}[id="${CSS... | jupyterlab is a JupyterLab computational environment.
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Markdown Preview feature. An attacker can access any data that the attacked user has access to, as well as perform arbitrary requests acting as the attacked user by opening a mali... | CVE-2024-22420 | TypeScript | [
"CWE-79"
] |
b6d452e7-4a5c-4829-b026-c1cb7e22b2f2 | export async function getHeadingId(
parser: IMarkdownParser,
raw: string,
level: number
): Promise<string | null> {
try {
const innerHTML = await parser.render(raw);
if (!innerHTML) {
return null;
}
const container = document.createElement('div');
container.innerHTML = innerHTML;
... | jupyterlab is a JupyterLab computational environment.
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Markdown Preview feature. An attacker can access any data that the attacked user has access to, as well as perform arbitrary requests acting as the attacked user by opening a mali... | CVE-2024-22420 | TypeScript | [
"CWE-79"
] | |
0e9c1dd1-f5c8-412b-bef5-e1b751a1e521 | const onHeadingsChanged = () => {
if (!this.parser) {
return;
}
// Clear all numbering items
TableOfContentsUtils.clearNumbering(widget.content.node);
// Create a new mapping
headingToElement = new WeakMap<IMarkdownViewerHeading, Element | null>();
model.headings.... | const onHeadingsChanged = () => {
if (!this.parser) {
return;
}
// Clear all numbering items
TableOfContentsUtils.clearNumbering(widget.content.node);
// Create a new mapping
headingToElement = new WeakMap<IMarkdownViewerHeading, Element | null>();
model.headings.... | ### Impact
The vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature.
A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user.
### Patches
Ju... | CVE-2024-22420 | TypeScript | [
"CWE-79"
] |
ac51f6d0-4cdd-47cd-86ff-83baa82b2918 | const findHeadingElement = (cell: Cell): void => {
model.getCellHeadings(cell).forEach(async heading => {
const elementId = await getIdForHeading(heading, this.parser!);
const selector = elementId
? `h${heading.level}[id="${elementId}"]`
: `h${heading.level}`;
if ... | const findHeadingElement = (cell: Cell): void => {
model.getCellHeadings(cell).forEach(async heading => {
const elementId = await getIdForHeading(
heading,
this.parser!,
this.sanitizer
);
const selector = elementId
? `h${heading.level}[id="${CSS... | ### Impact
The vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature.
A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user.
### Patches
Ju... | CVE-2024-22420 | TypeScript | [
"CWE-79"
] |
b84ff991-f701-445c-96da-4e750350adcc | export async function getIdForHeading(
heading: INotebookHeading,
parser: IRenderMime.IMarkdownParser
) {
let elementId: string | null = null;
if (heading.type === Cell.HeadingType.Markdown) {
elementId = await TableOfContentsUtils.Markdown.getHeadingId(
parser,
// Type from TableOfContentsUtils... | export async function getIdForHeading(
heading: INotebookHeading,
parser: IRenderMime.IMarkdownParser,
sanitizer: IRenderMime.ISanitizer
) {
let elementId: string | null = null;
if (heading.type === Cell.HeadingType.Markdown) {
elementId = await TableOfContentsUtils.Markdown.getHeadingId(
parser,
... | ### Impact
The vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature.
A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user.
### Patches
Ju... | CVE-2024-22420 | TypeScript | [
"CWE-79"
] |
dc898b45-79f4-4993-82b6-033553c60531 | export async function getHeadingId(
parser: IMarkdownParser,
raw: string,
level: number
): Promise<string | null> {
try {
const innerHTML = await parser.render(raw);
if (!innerHTML) {
return null;
}
const container = document.createElement('div');
container.innerHTML = innerHTML;
... | ### Impact
The vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature.
A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user.
### Patches
Ju... | CVE-2024-22420 | TypeScript | [
"CWE-79"
] | |
74f71535-20ba-40f2-bfef-1d4c17bf40d8 | void context.ready.then(async () => {
const file = context.model;
const workspace = file.toJSON() as unknown as Workspace.IWorkspace;
const path = context.path;
const id = workspace.metadata.id;
// Save the file contents as a workspace.
await this._workspaces.save(... | void context.ready.then(async () => {
const file = context.model;
const workspace = file.toJSON() as unknown as Workspace.IWorkspace;
const path = context.path;
const id = workspace.metadata.id;
// Save the file contents as a workspace.
await this._workspaces.save(... | jupyterlab is a JupyterLab computational environment.
Affected versions of this package are vulnerable to Information Exposure due to improper handling of Authorization and XSRFToken headers. An attacker can expose sensitive tokens to a third party by convincing a user to click on a malicious link when running an old v... | CVE-2024-22421 | TypeScript | [
"CWE-200",
"CWE-23"
] |
25ef9bbd-48e6-40d2-96a2-6f7b63cf6200 | export function getSessionUrl(baseUrl: string, id: string): string {
return URLExt.join(baseUrl, SESSION_SERVICE_URL, id);
}
| export function getSessionUrl(baseUrl: string, id: string): string {
const servicesBase = URLExt.join(baseUrl, SESSION_SERVICE_URL);
const result = URLExt.join(servicesBase, id);
if (!result.startsWith(servicesBase)) {
throw new Error('Can only be used for services requests');
}
return result;
}
| jupyterlab is a JupyterLab computational environment.
Affected versions of this package are vulnerable to Information Exposure due to improper handling of Authorization and XSRFToken headers. An attacker can expose sensitive tokens to a third party by convincing a user to click on a malicious link when running an old v... | CVE-2024-22421 | TypeScript | [
"CWE-200",
"CWE-23"
] |
c5c0d607-fe35-4c29-82b8-8921d6bc3055 | void context.ready.then(async () => {
const file = context.model;
const workspace = (file.toJSON() as unknown) as Workspace.IWorkspace;
const path = context.path;
const id = workspace.metadata.id;
// Save the file contents as a workspace.
await this._workspaces.sav... | void context.ready.then(async () => {
const file = context.model;
const workspace = (file.toJSON() as unknown) as Workspace.IWorkspace;
const path = context.path;
const id = workspace.metadata.id;
// Save the file contents as a workspace.
await this._workspaces.sav... | jupyterlab is a JupyterLab computational environment.
Affected versions of this package are vulnerable to Information Exposure due to improper handling of Authorization and XSRFToken headers. An attacker can expose sensitive tokens to a third party by convincing a user to click on a malicious link when running an old v... | CVE-2024-22421 | TypeScript | [
"CWE-200",
"CWE-23"
] |
fef42cc3-eea8-43d4-aaeb-d374fad4ff10 | export function getSessionUrl(baseUrl: string, id: string): string {
return URLExt.join(baseUrl, SESSION_SERVICE_URL, id);
}
| export function getSessionUrl(baseUrl: string, id: string): string {
const servicesBase = URLExt.join(baseUrl, SESSION_SERVICE_URL);
const result = URLExt.join(servicesBase, id);
if (!result.startsWith(servicesBase)) {
throw new Error('Can only be used for services requests');
}
return result;
}
| jupyterlab is a JupyterLab computational environment.
Affected versions of this package are vulnerable to Information Exposure due to improper handling of Authorization and XSRFToken headers. An attacker can expose sensitive tokens to a third party by convincing a user to click on a malicious link when running an old v... | CVE-2024-22421 | TypeScript | [
"CWE-200",
"CWE-23"
] |
eb128074-8c7a-4fe4-b788-08043b185176 | void context.ready.then(async () => {
const file = context.model;
const workspace = file.toJSON() as unknown as Workspace.IWorkspace;
const path = context.path;
const id = workspace.metadata.id;
// Save the file contents as a workspace.
await this._workspaces.save(... | void context.ready.then(async () => {
const file = context.model;
const workspace = file.toJSON() as unknown as Workspace.IWorkspace;
const path = context.path;
const id = workspace.metadata.id;
// Save the file contents as a workspace.
await this._workspaces.save(... | ### Impact
Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version.
### Patches
JupyterLab 4.1.0b2, 4.0.11, and 3.6.7 were patched.
### Workarounds
No workaround has been identified, however users sh... | CVE-2024-22421 | TypeScript | [
"CWE-200",
"CWE-23"
] |
2170ce7c-eb96-4176-94fc-c7abf7c0bf20 | export function getSessionUrl(baseUrl: string, id: string): string {
return URLExt.join(baseUrl, SESSION_SERVICE_URL, id);
}
| export function getSessionUrl(baseUrl: string, id: string): string {
const servicesBase = URLExt.join(baseUrl, SESSION_SERVICE_URL);
const result = URLExt.join(servicesBase, id);
if (!result.startsWith(servicesBase)) {
throw new Error('Can only be used for services requests');
}
return result;
}
| ### Impact
Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version.
### Patches
JupyterLab 4.1.0b2, 4.0.11, and 3.6.7 were patched.
### Workarounds
No workaround has been identified, however users sh... | CVE-2024-22421 | TypeScript | [
"CWE-200",
"CWE-23"
] |
7ad44889-2058-4ad3-bed8-cf33379f5e1f | export const getLogDetail = async (url: string) => {
url = getLogUrl(url);
const rsp = await get(url);
if (rsp.headers["content-type"]?.includes("html")) {
const el = document.createElement("div");
el.innerHTML = rsp.data;
const arr = [].map.call(
el.getElementsByTagName("li"),
(li: HTMLLI... | ray is an A system for parallel and distributed Python that unifies the ML ecosystem.
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the dashboard API, via the url parameter of the /log_proxy API endpoint. An attacker can retrieve the highly privileged IAM credentials req... | CVE-2023-48022 | TypeScript | [
"CWE-918"
] | |
4aa3340a-93e0-403a-bc59-439fc08fa0cc | export const getLogDownloadUrl = (url: string) => {
url = getLogUrl(url);
if (url === "log_index") {
return undefined;
}
return url;
};
| ray is an A system for parallel and distributed Python that unifies the ML ecosystem.
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the dashboard API, via the url parameter of the /log_proxy API endpoint. An attacker can retrieve the highly privileged IAM credentials req... | CVE-2023-48022 | TypeScript | [
"CWE-918"
] | |
feab85ec-1790-421f-b4b7-6c5eecc65f9b | export const getLogDetail = async (url: string) => {
url = getLogUrl(url);
const rsp = await get(url);
if (rsp.headers["content-type"]?.includes("html")) {
const el = document.createElement("div");
el.innerHTML = rsp.data;
const arr = [].map.call(
el.getElementsByTagName("li"),
(li: HTMLLI... | Description
Attackers can read any file on the system with the permissions of the user that started the Ray Dashboard.
Proof of Concept
GET /api/v0/logs/file?node_id=56424ecdb00cf570f0831aa698dd7c44e527a20212d2fa27078c7f79&filename=../../../../../etc%2fpasswd&lines=50000 HTTP/1.1
Host: localhost:8265
User-Agent: Mozill... | TypeScript | [] | ||
2c7a3ffb-9a3a-422e-955c-8de582386d4b | export const getLogDownloadUrl = (url: string) => {
url = getLogUrl(url);
if (url === "log_index") {
return undefined;
}
return url;
};
| Description
Attackers can read any file on the system with the permissions of the user that started the Ray Dashboard.
Proof of Concept
GET /api/v0/logs/file?node_id=56424ecdb00cf570f0831aa698dd7c44e527a20212d2fa27078c7f79&filename=../../../../../etc%2fpasswd&lines=50000 HTTP/1.1
Host: localhost:8265
User-Agent: Mozill... | TypeScript | [] |
README.md exists but content is empty.
- Downloads last month
- 16