The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html - | |
References | () http://seclists.org/oss-sec/2015/q3/558 - | |
References | () http://seclists.org/oss-sec/2015/q3/634 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1264067 - | |
References | () https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967 - | |
References | () https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5 - | |
References | () https://security.gentoo.org/glsa/201512-02 - |
Information
Published : 2015-09-29 19:59
Updated : 2024-11-21 02:36
NVD link : CVE-2015-7337
Mitre link : CVE-2015-7337
CVE.ORG link : CVE-2015-7337
JSON object : View
Products Affected
ipython
- notebook
jupyter
- notebook
CWE
CWE-20
Improper Input Validation