|
Message-ID: <CA+tbMaUt1xQJBHAUDrhzagmc5Ni7v08DQ3OD2XOtvgzWnFrbvg@mail.gmail.com> Date: Tue, 15 Jul 2014 03:38:27 -0600 From: Kyle Kelley <rgbkrk@...il.com> To: oss-security@...ts.openwall.com Subject: IPython Notebook Cross 2014-3429 Hey OSS Security list, We posted details to MITRE back in early May and got assigned a CVE number (CVE-2014-3429) but haven't seen details been posted yet. It has been patched for some time now. In the interest of full disclosure, I'm providing the same details to this list. Email address of requester: security@...thon.org; rgbkrk@...il.com Software name: IPython notebook Type of vulnerability: Cross domain websocket hijacking Attack outcome: Remote execution Patch/issue: https://github.com/ipython/ipython/pull/4845 Changelog: http://ipython.org/ipython-doc/stable/whatsnew/github-stats-2.0.html Affected versions: 0.12 ≤ version < 1.2 Summary: The origin of websocket requests was not verified within the IPython notebook server. If an attacker has knowledge of an IPython kernel id they can run arbitrary code on a user's machine when the client visits a crafted malicious page. Post on our own mailing list: http://permalink.gmane.org/gmane.comp.python.ipython.devel/13198 Note: truncated CVE was posted to the mailing list, corrected after (my bad). Thank you, Kyle Kelley
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.