Description
The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.
References (7)
Core 7
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201512-02
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1264067
Mailing List mailing-list
x_refsource_mlist
http://seclists.org/oss-sec/2015/q3/558
Patch x_refsource_confirm
https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967
Patch x_refsource_confirm
https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html
Mailing List mailing-list
x_refsource_mlist
http://seclists.org/oss-sec/2015/q3/634
Scores
EPSS
0.0077
EPSS Percentile
73.7%
Details
CWE
CWE-20
Status
published
Products (8)
ipython/notebook
< 3.2.1
jupyter/notebook
4.0.0
jupyter/notebook
4.0.1
jupyter/notebook
4.0.2
jupyter/notebook
4.0.3
jupyter/notebook
4.0.4
pypi/ipython
0 - 3.2.2PyPI
pypi/notebook
4.0.0 - 4.0.5PyPI
Published
Sep 29, 2015
Tracked Since
Feb 18, 2026