Cross-site request forgery in the REST API in IPython 2 and 3.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162671.html - Issue Tracking, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162936.html - Issue Tracking, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/07/21/3 - Exploit, Mailing List, Patch, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1243842 - Issue Tracking, Patch | |
References | () https://github.com/ipython/ipython/commit/1415a9710407e7c14900531813c15ba6165f0816 - Patch, Third Party Advisory | |
References | () https://github.com/ipython/ipython/commit/a05fe052a18810e92d9be8c1185952c13fe4e5b0 - Patch, Third Party Advisory |
Information
Published : 2017-09-20 16:29
Updated : 2024-11-21 02:33
NVD link : CVE-2015-5607
Mitre link : CVE-2015-5607
CVE.ORG link : CVE-2015-5607
JSON object : View
Products Affected
fedoraproject
- fedora
ipython
- ipython
CWE
CWE-352
Cross-Site Request Forgery (CSRF)