The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.
https://security.gentoo.org/glsa/201512-02
https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5
https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967
https://bugzilla.redhat.com/show_bug.cgi?id=1264067
http://seclists.org/oss-sec/2015/q3/634
http://seclists.org/oss-sec/2015/q3/558
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html
Published: 2015-09-29
Updated: 2025-04-12
Base Score: 6.8
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Severity: Medium
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
Base Score: 9.3
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Severity: Critical
EPSS: 0.00775