|
Message-ID: <CAHNn8BV_zT_eADA1DGDwQNG2EQQraW0nAe42z5ft+8P=5L5MZw@mail.gmail.com> Date: Wed, 16 Sep 2015 15:02:06 +0200 From: MinRK <benjaminrk@...il.com> To: oss-security@...ts.openwall.com Cc: security <security@...thon.org>, Kyle Kelley <rgbkrk@...il.com>, Jonathan Kamens <jkamens@...ntopian.com>, Scott Sanderson <ssanderson@...ntopian.com> Subject: CVE Request: Maliciously crafted text files in IPython/Jupyter editor Email address of requester: security@...thon.org, benjaminrk@...il.com, rgbkrk@...il.com, jkamens@...ntopian.com, ssanderson@...ntopian.com Software name: IPython notebook / Jupyter notebook Type of vulnerability: Maliciously forged file Attack outcome: Possible remote execution Vulnerability: A maliciously forged file opened for editing can execute javascript, specifically by being redirected to /files/ due to a failure to treat the file as plain text. Affected versions: - IPython 3.0 ≤ version ≤ 3.2.1 - notebook 4.0 ≤ 4.0.4 URI with issues: - GET /edit/** Patches: - IPython 3.x: 0a8096adf165e2465550bd5893d7e352544e5967 ( https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967 ) - Jupyter 4.0.x: 9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5 ( https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5 ) Mitigations: Upgrade to IPython/Jupyter notebook 4.0.5, 4.1 or 3.2.2 once available. If using pip, pip install --upgrade "ipython[notebook]<4.0" # for 3.2.2 pip install --upgrade notebook # for 4.1 or 4.0.5 For conda: conda update conda conda update ipython "ipython-notebook<4.0" # for 3.2.2 conda update notebook # for 4.1 or 4.0.5 Vulnerability reported by Jonathan Kamens at Quantopian
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.