IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
                
            References
                    | Link | Resource | 
|---|---|
| http://advisories.mageia.org/MGASA-2014-0320.html | Third Party Advisory | 
| http://lambdaops.com/cross-origin-websocket-hijacking-of-ipython | Press/Media Coverage Technical Description | 
| http://lists.opensuse.org/opensuse-updates/2014-08/msg00039.html | Third Party Advisory | 
| http://permalink.gmane.org/gmane.comp.python.ipython.devel/13198 | Broken Link | 
| http://seclists.org/oss-sec/2014/q3/152 | Third Party Advisory VDB Entry | 
| http://www.mandriva.com/security/advisories?name=MDVSA-2015:160 | Broken Link | 
| https://bugzilla.redhat.com/show_bug.cgi?id=1119890 | Issue Tracking | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/94497 | |
| https://github.com/ipython/ipython/pull/4845 | Patch Issue Tracking | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2014-08-07 11:13
Updated : 2018-10-30 16:27
NVD link : CVE-2014-3429
Mitre link : CVE-2014-3429
CVE.ORG link : CVE-2014-3429
JSON object : View
Products Affected
                opensuse
- opensuse
ipython
- ipython_notebook
mageia
- mageia
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
