CVE-2015-6938

Cross-site scripting (XSS) vulnerability in the file browser in notebook/notebookapp.py in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via a folder name. NOTE: this was originally reported as a cross-site request forgery (CSRF) vulnerability, but this may be inaccurate.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166460.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166471.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-10/msg00016.html Third Party Advisory
http://seclists.org/oss-sec/2015/q3/474
http://seclists.org/oss-sec/2015/q3/544 Mailing List Patch
https://bugzilla.redhat.com/show_bug.cgi?id=1259405 Issue Tracking
https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892 Exploit
https://github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ed Exploit
https://github.com/jupyter/notebook/commit/dd9876381f0ef09873d8c5f6f2063269172331e3 Issue Tracking Patch
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166460.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166471.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-10/msg00016.html Third Party Advisory
http://seclists.org/oss-sec/2015/q3/474
http://seclists.org/oss-sec/2015/q3/544 Mailing List Patch
https://bugzilla.redhat.com/show_bug.cgi?id=1259405 Issue Tracking
https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892 Exploit
https://github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ed Exploit
https://github.com/jupyter/notebook/commit/dd9876381f0ef09873d8c5f6f2063269172331e3 Issue Tracking Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jupyter:notebook:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:jupyter:notebook:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:jupyter:notebook:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:jupyter:notebook:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:jupyter:notebook:4.0.4:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:ipython:notebook:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:35

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166460.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166460.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166471.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166471.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2015-10/msg00016.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2015-10/msg00016.html - Third Party Advisory
References () http://seclists.org/oss-sec/2015/q3/474 - () http://seclists.org/oss-sec/2015/q3/474 -
References () http://seclists.org/oss-sec/2015/q3/544 - Mailing List, Patch () http://seclists.org/oss-sec/2015/q3/544 - Mailing List, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=1259405 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1259405 - Issue Tracking
References () https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892 - Exploit () https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892 - Exploit
References () https://github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ed - Exploit () https://github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ed - Exploit
References () https://github.com/jupyter/notebook/commit/dd9876381f0ef09873d8c5f6f2063269172331e3 - Patch, Issue Tracking () https://github.com/jupyter/notebook/commit/dd9876381f0ef09873d8c5f6f2063269172331e3 - Issue Tracking, Patch

Information

Published : 2015-09-21 19:59

Updated : 2024-11-21 02:35


NVD link : CVE-2015-6938

Mitre link : CVE-2015-6938

CVE.ORG link : CVE-2015-6938


JSON object : View

Products Affected

opensuse

  • opensuse

ipython

  • notebook

fedoraproject

  • fedora

jupyter

  • notebook
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')