CVE-2015-7337: Improper Input Validation in Jupyter Notebook
(updated )
The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.
References
- bugzilla.redhat.com/show_bug.cgi?id=1264067
- github.com/advisories/GHSA-92mr-v722-f48m
- github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967
- github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5
- github.com/pypa/advisory-database/tree/main/vulns/ipython/PYSEC-2015-25.yaml
- github.com/pypa/advisory-database/tree/main/vulns/notebook/PYSEC-2015-27.yaml
- nvd.nist.gov/vuln/detail/CVE-2015-7337
- security.gentoo.org/glsa/201512-02
Detect and mitigate CVE-2015-7337 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →