<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>@Jupyter-Notebook/Help-Extension — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/@jupyter-notebook/help-extension/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 17:25:47 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/@jupyter-notebook/help-extension/feed.xml" rel="self" type="application/rss+xml"/><item><title>Jupyter Notebook Authentication Token Theft via CommandLinker XSS</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-jupyter-xss/</link><pubDate>Thu, 30 Apr 2026 17:25:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-jupyter-xss/</guid><description>A stored Cross-Site Scripting (XSS) vulnerability in Jupyter Notebook versions 7.0.0 through 7.5.5 and JupyterLab versions up to 4.5.6 allows attackers to steal authentication tokens by tricking users into interacting with malicious notebook files, leading to complete account takeover via the Jupyter REST API.</description><content:encoded><![CDATA[<p>A stored Cross-Site Scripting (XSS) vulnerability has been identified in Jupyter Notebook and JupyterLab, impacting versions 7.0.0 through 7.5.5 of Jupyter Notebook and versions up to 4.5.6 of JupyterLab. Discovered by Daniel Teixeira of the NVIDIA AI Red Team, this flaw allows an attacker to craft malicious notebook files containing XSS payloads embedded within the command linker functionality. When a user opens and interacts with these files, the injected script executes, potentially stealing the user&rsquo;s authentication token. Successful exploitation grants the attacker full control over the user&rsquo;s Jupyter account, enabling them to read, modify, and create files, execute arbitrary code via running kernels, and establish shell access through created terminals. This vulnerability poses a significant risk to data confidentiality, integrity, and system availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Jupyter Notebook file containing a stored XSS payload within the command linker functionality.</li>
<li>The attacker distributes the malicious notebook file to a target user (e.g., via email, shared repository, or compromised website).</li>
<li>The victim opens the malicious notebook file in a vulnerable version of Jupyter Notebook or JupyterLab.</li>
<li>The victim interacts with a seemingly legitimate control element within the notebook that is, in fact, part of the XSS payload.</li>
<li>The injected XSS code executes in the victim&rsquo;s browser, stealing their authentication token.</li>
<li>The attacker uses the stolen authentication token to authenticate to the Jupyter REST API.</li>
<li>The attacker gains complete control over the victim&rsquo;s Jupyter account.</li>
<li>The attacker performs malicious actions, such as reading files, modifying files, executing arbitrary code, or creating terminals for shell access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability enables complete account takeover, allowing attackers to read, modify, and create files, access running kernels and execute arbitrary code, and create terminals for shell access within the victim&rsquo;s Jupyter environment. This can lead to data exfiltration, code injection, and potential compromise of sensitive information stored within the Jupyter Notebook environment. Given the widespread use of Jupyter Notebook in data science, machine learning, and research environments, this vulnerability can have far-reaching consequences for individuals and organizations relying on these tools.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Jupyter Notebook to version 7.5.6 or later, and JupyterLab to version 4.5.7 or later to patch CVE-2026-40171.</li>
<li>Apply the workaround to disable the help extension via CLI as specified in the advisory to mitigate the vulnerability until patching is possible.</li>
<li>Implement the hardening measure by disabling the command linker functionality via <code>overrides.json</code> to prevent XSS attacks, referencing the configuration details in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Jupyter Notebook CommandLinker XSS Attempt&rdquo; to detect potential exploitation attempts based on specific HTTP request characteristics.</li>
<li>Educate users about the risks of opening untrusted Jupyter Notebook files and interacting with potentially malicious content.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>jupyter</category><category>authentication</category><category>account-takeover</category><category>vulnerability</category></item></channel></rss>