3 results (0.004 seconds)

CVSS: 6.8EPSS: 1%CPEs: 6EXPL: 0

The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types. Vulnerabilidad en el editor en IPython Notebook en versiones anteriores a 3.2.2 y Jupyter Notebook 4.0.x en versiones anteriores a 4.0.5, permite a atacantes remotos ejecutar código JavaScript arbitrario a través de un archivo manipulado, lo que desencadena una redireción a files/, relacionado con los tipos MIME. • http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html http://seclists.org/oss-sec/2015/q3/558 http://seclists.org/oss-sec/2015/q3/634 https://bugzilla.redhat.com/show_bug.cgi?id=1264067 https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967 https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5 https://security.gentoo.org/glsa/201512-02 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 2

Cross-site scripting (XSS) vulnerability in the file browser in notebook/notebookapp.py in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via a folder name. NOTE: this was originally reported as a cross-site request forgery (CSRF) vulnerability, but this may be inaccurate. Vulnerabilidad de XSS en el buscador de archivos en notebook/notebookapp.py en IPython Notebook en versiones anteriores a 3.2.2 y Jupyter Notebook 4.0.x en versiones anteriores a 4.0.5, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del nombre de una carpeta. NOTA: esta vulnerabilidad fue inicialmente reportada como (CSRF), pero esto puede ser incorrecto. • http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166460.html http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166471.html http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html http://lists.opensuse.org/opensuse-updates/2015-10/msg00016.html http://seclists.org/oss-sec/2015/q3/474 http://seclists.org/oss-sec/2015/q3/544 https://bugzilla.redhat.com/show_bug.cgi?id=1259405 https://github.com/ipython/ipython/commit/3a • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 11EXPL: 0

IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page. IPython Notebook 0.12 hasta 1.x anterior a 1.2 no valida el origen de las solicitudes de Websockets, lo que permite a atacantes remotos ejecutar código arbitrario mediante el aprovechamiento de conocimiento del kernel id y una página manipulada. • http://advisories.mageia.org/MGASA-2014-0320.html http://lambdaops.com/cross-origin-websocket-hijacking-of-ipython http://lists.opensuse.org/opensuse-updates/2014-08/msg00039.html http://permalink.gmane.org/gmane.comp.python.ipython.devel/13198 http://seclists.org/oss-sec/2014/q3/152 http://www.mandriva.com/security/advisories?name=MDVSA-2015:160 https://bugzilla.redhat.com/show_bug.cgi?id=1119890 https://exchange.xforce.ibmcloud.com/vulnerabilities/94497 https://github.com/ipython/ipyth • CWE-94: Improper Control of Generation of Code ('Code Injection') •