Ubuntu update for ipython



Published: 2023-03-15
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2015-5607
CVE-2022-21699
CWE-ID CWE-352
CWE-269
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Ubuntu
Operating systems & Components / Operating system

ipython-notebook (Ubuntu package)
Operating systems & Components / Operating system package or component

ipython-notebook-common (Ubuntu package)
Operating systems & Components / Operating system package or component

ipython3-notebook (Ubuntu package)
Operating systems & Components / Operating system package or component

python-ipython (Ubuntu package)
Operating systems & Components / Operating system package or component

ipython (Ubuntu package)
Operating systems & Components / Operating system package or component

ipython3 (Ubuntu package)
Operating systems & Components / Operating system package or component

python3-ipython (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Cross-site request forgery

EUVDB-ID: #VU38231

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-5607

CWE-ID: CWE-352 - Cross-Site Request Forgery (CSRF)

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Cross-site request forgery in the REST API in IPython 2 and 3.

Mitigation

Update the affected package ipython to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 20.04

ipython-notebook (Ubuntu package): before Ubuntu Pro

ipython-notebook-common (Ubuntu package): before Ubuntu Pro

ipython3-notebook (Ubuntu package): before Ubuntu Pro

python-ipython (Ubuntu package): before Ubuntu Pro

ipython (Ubuntu package): before Ubuntu Pro

ipython3 (Ubuntu package): before Ubuntu Pro

python3-ipython (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-5953-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Privilege Management

EUVDB-ID: #VU60245

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21699

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to improper privilege management when handling cross user temporary files. A local user can execute arbitrary code with privileges of another user.

Mitigation

Update the affected package ipython to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 20.04

ipython-notebook (Ubuntu package): before Ubuntu Pro

ipython-notebook-common (Ubuntu package): before Ubuntu Pro

ipython3-notebook (Ubuntu package): before Ubuntu Pro

python-ipython (Ubuntu package): before Ubuntu Pro

ipython (Ubuntu package): before Ubuntu Pro

ipython3 (Ubuntu package): before Ubuntu Pro

python3-ipython (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-5953-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###