First published: Tue Jul 15 2014(Updated: )
IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/ipython | >=0.12<1.2.0 | 1.2.0 |
redhat/ipython | <2.0.0 | 2.0.0 |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
Ipython Ipython Notebook | =0.12 | |
Ipython Ipython Notebook | =0.12.1 | |
Ipython Ipython Notebook | =0.13 | |
Ipython Ipython Notebook | =0.13.1 | |
Ipython Ipython Notebook | =0.13.2 | |
Ipython Ipython Notebook | =1.0.0 | |
Ipython Ipython Notebook | =1.1.0 | |
Mageia Mageia | =3.0 | |
Mageia Mageia | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.