Cross-site request forgery in the REST API in IPython 2 and 3.
                
            References
                    | Link | Resource | 
|---|---|
| http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162671.html | Issue Tracking Third Party Advisory | 
| http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162936.html | Issue Tracking Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2015/07/21/3 | Exploit Mailing List Patch Third Party Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=1243842 | Issue Tracking Patch | 
| https://github.com/ipython/ipython/commit/1415a9710407e7c14900531813c15ba6165f0816 | Patch Third Party Advisory | 
| https://github.com/ipython/ipython/commit/a05fe052a18810e92d9be8c1185952c13fe4e5b0 | Patch Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2017-09-20 16:29
Updated : 2017-10-05 14:31
NVD link : CVE-2015-5607
Mitre link : CVE-2015-5607
CVE.ORG link : CVE-2015-5607
JSON object : View
Products Affected
                fedoraproject
- fedora
ipython
- ipython
CWE
                
                    
                        
                        CWE-352
                        
            Cross-Site Request Forgery (CSRF)
