IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
References
Link | Resource |
---|---|
http://lambdaops.com/cross-origin-websocket-hijacking-of-ipython | Press/Media Coverage Technical Description |
http://permalink.gmane.org/gmane.comp.python.ipython.devel/13198 | Broken Link |
http://seclists.org/oss-sec/2014/q3/152 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1119890 | Issue Tracking |
https://github.com/ipython/ipython/pull/4845 | Patch Issue Tracking |
http://lists.opensuse.org/opensuse-updates/2014-08/msg00039.html | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:160 | Broken Link |
http://advisories.mageia.org/MGASA-2014-0320.html | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/94497 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2014-08-07 04:13
Updated : 2018-10-30 09:27
NVD link : CVE-2014-3429
Mitre link : CVE-2014-3429
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
ipython
- ipython_notebook
mageia
- mageia
opensuse
- opensuse