Cross-site request forgery in the REST API in IPython 2 and 3.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1243842 | issue tracking patch |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162671.html | issue tracking third party advisory vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162936.html | issue tracking third party advisory vendor advisory |
https://github.com/ipython/ipython/commit/1415a9710407e7c14900531813c15ba6165f0816 | third party advisory patch |
https://github.com/ipython/ipython/commit/a05fe052a18810e92d9be8c1185952c13fe4e5b0 | third party advisory patch |
http://www.openwall.com/lists/oss-security/2015/07/21/3 | mailing list patch exploit third party advisory |