{"id":"PYSEC-2015-27","details":"The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.","aliases":["CVE-2015-7337","GHSA-92mr-v722-f48m","PYSEC-2015-25"],"modified":"2023-11-08T03:57:59.998735Z","published":"2015-09-29T19:59:00Z","references":[{"type":"FIX","url":"https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5"},{"type":"FIX","url":"https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967"},{"type":"WEB","url":"http://seclists.org/oss-sec/2015/q3/558"},{"type":"WEB","url":"http://seclists.org/oss-sec/2015/q3/634"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1264067"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201512-02"}],"affected":[{"package":{"name":"notebook","ecosystem":"PyPI","purl":"pkg:pypi/notebook"},"ranges":[{"type":"GIT","repo":"https://github.com/jupyter/notebook","events":[{"introduced":"0"},{"fixed":"9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.0.0"},{"fixed":"4.0.5"}]}],"versions":["4.0.0","4.0.1","4.0.2","4.0.4"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/notebook/PYSEC-2015-27.yaml"}}],"schema_version":"1.7.3"}