Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 15 Jul 2014 03:38:27 -0600
From: Kyle Kelley <rgbkrk@...il.com>
To: oss-security@...ts.openwall.com
Subject: IPython Notebook Cross 2014-3429

Hey OSS Security list,

We posted details to MITRE back in early May and got assigned a CVE number
(CVE-2014-3429) but haven't seen details been posted yet. It has been
patched for some time now. In the interest of full disclosure, I'm
providing the same details to this list.

Email address of requester: security@...thon.org; rgbkrk@...il.com
Software name: IPython notebook
Type of vulnerability: Cross domain websocket hijacking
Attack outcome: Remote execution
Patch/issue: https://github.com/ipython/ipython/pull/4845
Changelog:
http://ipython.org/ipython-doc/stable/whatsnew/github-stats-2.0.html
Affected versions: 0.12 ≤ version < 1.2

Summary: The origin of websocket requests was not verified within the
IPython notebook server. If an attacker has knowledge of an IPython kernel
id they can run arbitrary code on a user's machine when the client visits a
crafted malicious page.

Post on our own mailing list:
http://permalink.gmane.org/gmane.comp.python.ipython.devel/13198 Note:
truncated CVE was posted to the mailing list, corrected after (my bad).

Thank you,

Kyle Kelley

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ