First published: Tue Jul 15 2014(Updated: )
IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ipython | <2.0.0 | 2.0.0 |
pip/ipython | >=0.12<1.2.0 | 1.2.0 |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
IPython Notebook | =0.12 | |
IPython Notebook | =0.12.1 | |
IPython Notebook | =0.13 | |
IPython Notebook | =0.13.1 | |
IPython Notebook | =0.13.2 | |
IPython Notebook | =1.0.0 | |
IPython Notebook | =1.1.0 | |
Mageia | =3.0 | |
Mageia | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3429 is considered a critical vulnerability because it allows remote attackers to execute arbitrary code.
To fix CVE-2014-3429, upgrade IPython Notebook to version 1.2.0 or later.
IPython Notebook versions 0.12 through 1.x before 1.2.0 are affected by CVE-2014-3429.
There is no documented workaround for CVE-2014-3429; upgrading to a secure version is recommended.
CVE-2014-3429 facilitates cross-site request forgery attacks that can result in arbitrary code execution.