CVE-2014-3429: IPython Notebook vulnerable to improper validation of the origin of websocket requests
(updated )
IPython Notebook 0.12 through 1.x before 1.2.0 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
References
- bugzilla.redhat.com/show_bug.cgi?id=1119890
- exchange.xforce.ibmcloud.com/vulnerabilities/94497
- github.com/advisories/GHSA-75cw-5cgv-g853
- github.com/ipython/ipython
- github.com/ipython/ipython/commit/e5b669ce4750d628dba383fd637dbde918ea15f5
- github.com/ipython/ipython/pull/4845
- github.com/mattvonrocketstein/ipython/commit/dd4135db9f42d196a46553310a8e63ff5658671d
- github.com/pypa/advisory-database/tree/main/vulns/ipython/PYSEC-2014-21.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-3429
Detect and mitigate CVE-2014-3429 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →