CVE-2015-7337
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
29/09/2015
Last modified:
12/04/2025
Description
The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ipython:notebook:*:*:*:*:*:*:*:* | 3.2.1 (including) | |
| cpe:2.3:a:jupyter:notebook:4.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:jupyter:notebook:4.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:jupyter:notebook:4.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:jupyter:notebook:4.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:jupyter:notebook:4.0.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html
- http://seclists.org/oss-sec/2015/q3/558
- http://seclists.org/oss-sec/2015/q3/634
- https://bugzilla.redhat.com/show_bug.cgi?id=1264067
- https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967
- https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5
- https://security.gentoo.org/glsa/201512-02
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html
- http://seclists.org/oss-sec/2015/q3/558
- http://seclists.org/oss-sec/2015/q3/634
- https://bugzilla.redhat.com/show_bug.cgi?id=1264067
- https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967
- https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5
- https://security.gentoo.org/glsa/201512-02



