First published: Thu Sep 17 2015(Updated: )
A vulnerability in IPython allowing maliciously forged file to be opened for editing that could execute javascript code, specifically by being redirected to /files/ due to the mistakenly treating the file as plain text. Versions >= 3.0 and <= 3.2.1 of IPython are affected. Upstream patch: <a href="https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967">https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967</a> CVE request: <a href="http://seclists.org/oss-sec/2015/q3/558">http://seclists.org/oss-sec/2015/q3/558</a>
Affected Software | Affected Version | How to fix |
---|---|---|
IPython | >=3.0<=3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1264067 is considered to be critical due to the potential execution of malicious JavaScript code.
To fix REDHAT-BUG-1264067, upgrade IPython to a version greater than 3.2.1.
Versions of IPython from 3.0 up to and including 3.2.1 are affected by REDHAT-BUG-1264067.
The vulnerability in REDHAT-BUG-1264067 allows for a maliciously forged file to be opened for editing, potentially executing JavaScript code.
Yes, REDHAT-BUG-1264067 can impact user privacy by enabling the execution of unwanted scripts that may compromise sensitive information.