You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The ydata-profiling project is currently using jQuery version 1.12.4 in the HTML reports generated by the HTMLReport() function located in ydata_profiling/src/ydata_profiling/profile_report.py. This version of the library is known to have multiple security vulnerabilities that are documented in the National Vulnerability Database (NVD), including CVE-2020-11023 and CVE-2020-11022. These vulnerabilities expose users to potential cross-site scripting (XSS) attacks, which can compromise user security by allowing attackers to execute malicious scripts in users' browsers.
The HTMLReport() function is specifically responsible for creating the HTML output that includes the outdated and vulnerable version of jQuery. This incorporation of a vulnerable library directly affects the security of the application, putting user data at risk of XSS exploits.
For more details on these vulnerabilities, refer to the NVD:
The project ydata-profiling should be using a version of jQuery that is free from known security vulnerabilities to ensure the safety and security of its users. Ideally, the library should be updated to the latest stable version, such as jQuery 3.x, which has addressed and resolved the existing vulnerabilities found in earlier versions like 1.12.4.
Using a secure version of jQuery would prevent potential cross-site scripting (XSS) attacks that can be leveraged through vulnerabilities in older versions. This would help in maintaining the integrity and confidentiality of the user data processed by the ydata-profiling tool.
Current Behaviour
The ydata-profiling project is currently using jQuery version 1.12.4 in the HTML reports generated by the HTMLReport() function located in ydata_profiling/src/ydata_profiling/profile_report.py. This version of the library is known to have multiple security vulnerabilities that are documented in the National Vulnerability Database (NVD), including CVE-2020-11023 and CVE-2020-11022. These vulnerabilities expose users to potential cross-site scripting (XSS) attacks, which can compromise user security by allowing attackers to execute malicious scripts in users' browsers.
The HTMLReport() function is specifically responsible for creating the HTML output that includes the outdated and vulnerable version of jQuery. This incorporation of a vulnerable library directly affects the security of the application, putting user data at risk of XSS exploits.
For more details on these vulnerabilities, refer to the NVD:
CVE-2020-11023 on NVD
CVE-2020-11022 on NVD
Expected Behaviour
The project ydata-profiling should be using a version of jQuery that is free from known security vulnerabilities to ensure the safety and security of its users. Ideally, the library should be updated to the latest stable version, such as jQuery 3.x, which has addressed and resolved the existing vulnerabilities found in earlier versions like 1.12.4.
Using a secure version of jQuery would prevent potential cross-site scripting (XSS) attacks that can be leveraged through vulnerabilities in older versions. This would help in maintaining the integrity and confidentiality of the user data processed by the ydata-profiling tool.
Data Description
N/A
Code that reproduces the bug
pandas-profiling version
4.7.0
Dependencies
OS
No response
Checklist
The text was updated successfully, but these errors were encountered: