FreeBSD : devel/ipython -- multiple vulnerabilities (290351c9-6f5c-11e5-a2a1-002590263bf5)

medium Nessus Plugin ID 86335

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Matthias Bussonnier reports :

Summary: Local folder name was used in HTML templates without escaping, allowing XSS in said pages by carefully crafting folder name and URL to access it.

URI with issues :

- GET /tree/**

Benjamin RK reports :

Vulnerability: A maliciously forged file opened for editing can execute JavaScript, specifically by being redirected to /files/ due to a failure to treat the file as plain text.

URI with issues :

- GET /edit/**

Solution

Update the affected package.

See Also

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=203668

https://www.openwall.com/lists/oss-security/2015/09/02/3

http://www.nessus.org/u?cca005cb

https://www.openwall.com/lists/oss-security/2015/09/16/3

http://www.nessus.org/u?dd459183

http://www.nessus.org/u?1b01c971

Plugin Details

Severity: Medium

ID: 86335

File Name: freebsd_pkg_290351c96f5c11e5a2a1002590263bf5.nasl

Version: 2.5

Type: local

Published: 10/12/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ipython, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/10/2015

Vulnerability Publication Date: 9/1/2015

Reference Information

CVE: CVE-2015-6938, CVE-2015-7337