IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
References
| Link | Resource |
|---|---|
| http://lambdaops.com/cross-origin-websocket-hijacking-of-ipython | Press/Media Coverage Technical Description |
| http://permalink.gmane.org/gmane.comp.python.ipython.devel/13198 | Broken Link |
| http://seclists.org/oss-sec/2014/q3/152 | Third Party Advisory VDB Entry |
| https://bugzilla.redhat.com/show_bug.cgi?id=1119890 | Issue Tracking |
| https://github.com/ipython/ipython/pull/4845 | Patch Issue Tracking |
| http://lists.opensuse.org/opensuse-updates/2014-08/msg00039.html | Third Party Advisory |
| http://www.mandriva.com/security/advisories?name=MDVSA-2015:160 | Broken Link |
| http://advisories.mageia.org/MGASA-2014-0320.html | Third Party Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/94497 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2014-08-07 11:13
Updated : 2018-10-30 16:27
NVD link : CVE-2014-3429
Mitre link : CVE-2014-3429
JSON object : View
Products Affected
ipython
- ipython_notebook
opensuse
- opensuse
mageia
- mageia
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
