First published: Thu Sep 17 2015(Updated: )
A vulnerability in IPython allowing maliciously forged file to be opened for editing that could execute javascript code, specifically by being redirected to /files/ due to the mistakenly treating the file as plain text. Versions >= 3.0 and <= 3.2.1 of IPython are affected. Upstream patch: <a href="https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967">https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967</a> CVE request: <a href="http://seclists.org/oss-sec/2015/q3/558">http://seclists.org/oss-sec/2015/q3/558</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IPython Notebook | <=3.2.1 | |
Jupyter Notebook | =4.0.0 | |
Jupyter Notebook | =4.0.1 | |
Jupyter Notebook | =4.0.2 | |
Jupyter Notebook | =4.0.3 | |
Jupyter Notebook | =4.0.4 | |
pip/ipython | <=3.2.1 | 3.2.2 |
pip/notebook | >=4.0.0<=4.0.4 | 4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.