Vulnerability Details : CVE-2014-3429
IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
Vulnerability category: Execute code
Products affected by CVE-2014-3429
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipython:ipython_notebook:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ipython:ipython_notebook:0.12:*:*:*:*:*:*:*
- cpe:2.3:a:ipython:ipython_notebook:0.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipython:ipython_notebook:0.13:*:*:*:*:*:*:*
- cpe:2.3:a:ipython:ipython_notebook:0.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipython:ipython_notebook:0.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:ipython:ipython_notebook:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3429
2.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3429
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2014-3429
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3429
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:160
mandriva.comBroken Link
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/94497
IPython's Notebook server code execution CVE-2014-3429 Vulnerability Report
-
http://lists.opensuse.org/opensuse-updates/2014-08/msg00039.html
openSUSE-SU-2014:1060-1: moderate: update for IPythonThird Party Advisory
-
https://github.com/ipython/ipython/pull/4845
Add Origin Checking. by rgbkrk · Pull Request #4845 · ipython/ipython · GitHubPatch;Issue Tracking
-
http://lambdaops.com/cross-origin-websocket-hijacking-of-ipython
One Weird Kernel TrickPress/Media Coverage;Technical Description
-
https://bugzilla.redhat.com/show_bug.cgi?id=1119890
1119890 – (CVE-2014-3429) CVE-2014-3429 ipython: cross-domain websocket hijacking vulnerabilityIssue Tracking
-
http://seclists.org/oss-sec/2014/q3/152
oss-sec: IPython Notebook Cross 2014-3429Third Party Advisory;VDB Entry
-
http://permalink.gmane.org/gmane.comp.python.ipython.devel/13198
Broken Link
-
http://advisories.mageia.org/MGASA-2014-0320.html
Mageia Advisory: MGASA-2014-0320 - Updated ipython package fixes security vulnerabilityThird Party Advisory
Jump to