Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+tbMaUt1xQJBHAUDrhzagmc5Ni7v08DQ3OD2XOtvgzWnFrbvg@mail.gmail.com>
Date: Tue, 15 Jul 2014 03:38:27 -0600
From: Kyle Kelley <rgbkrk@...il.com>
To: oss-security@...ts.openwall.com
Subject: IPython Notebook Cross 2014-3429

Hey OSS Security list,

We posted details to MITRE back in early May and got assigned a CVE number
(CVE-2014-3429) but haven't seen details been posted yet. It has been
patched for some time now. In the interest of full disclosure, I'm
providing the same details to this list.

Email address of requester: security@...thon.org; rgbkrk@...il.com
Software name: IPython notebook
Type of vulnerability: Cross domain websocket hijacking
Attack outcome: Remote execution
Patch/issue: https://github.com/ipython/ipython/pull/4845
Changelog:
http://ipython.org/ipython-doc/stable/whatsnew/github-stats-2.0.html
Affected versions: 0.12 ≤ version < 1.2

Summary: The origin of websocket requests was not verified within the
IPython notebook server. If an attacker has knowledge of an IPython kernel
id they can run arbitrary code on a user's machine when the client visits a
crafted malicious page.

Post on our own mailing list:
http://permalink.gmane.org/gmane.comp.python.ipython.devel/13198 Note:
truncated CVE was posted to the mailing list, corrected after (my bad).

Thank you,

Kyle Kelley

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.