Cross-site request forgery in the REST API in IPython 2 and 3.
References
Link | Resource |
---|---|
https://github.com/ipython/ipython/commit/a05fe052a18810e92d9be8c1185952c13fe4e5b0 | Patch Third Party Advisory |
https://github.com/ipython/ipython/commit/1415a9710407e7c14900531813c15ba6165f0816 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1243842 | Issue Tracking Patch |
http://www.openwall.com/lists/oss-security/2015/07/21/3 | Exploit Mailing List Patch Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162936.html | Issue Tracking Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162671.html | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2017-09-20 09:29
Updated : 2017-10-05 07:31
NVD link : CVE-2015-5607
Mitre link : CVE-2015-5607
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
fedoraproject
- fedora
ipython
- ipython