Moderate severityNVD Advisory· Published Sep 21, 2015· Updated May 6, 2026
CVE-2015-6938
CVE-2015-6938
Description
Cross-site scripting (XSS) vulnerability in the file browser in notebook/notebookapp.py in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via a folder name. NOTE: this was originally reported as a cross-site request forgery (CSRF) vulnerability, but this may be inaccurate.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
notebookPyPI | >= 4.0.0, < 4.0.5 | 4.0.5 |
ipythonPyPI | < 3.2.2 | 3.2.2 |
Affected products
11cpe:2.3:a:jupyter:notebook:4.0.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:jupyter:notebook:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:jupyter:notebook:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:jupyter:notebook:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:jupyter:notebook:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:jupyter:notebook:4.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
Patches
33ab41641cf6fFix XSS reported on Security list
1 file changed · +3 −1
IPython/html/notebookapp.py+3 −1 modified@@ -158,7 +158,9 @@ def init_settings(self, ipython_app, kernel_manager, contents_manager, _template_path = (_template_path,) template_path = [os.path.expanduser(path) for path in _template_path] - jenv_opt = jinja_env_options if jinja_env_options else {} + jenv_opt = {"autoescape": True} + jenv_opt.update(jinja_env_options if jinja_env_options else {}) + env = Environment(loader=FileSystemLoader(template_path), **jenv_opt) sys_info = get_sys_info()
dd9876381f0eFix XSS reported on Security list
1 file changed · +3 −1
notebook/notebookapp.py+3 −1 modified@@ -160,7 +160,9 @@ def init_settings(self, ipython_app, kernel_manager, contents_manager, _template_path = (_template_path,) template_path = [os.path.expanduser(path) for path in _template_path] - jenv_opt = jinja_env_options if jinja_env_options else {} + jenv_opt = {"autoescape": True} + jenv_opt.update(jinja_env_options if jinja_env_options else {}) + env = Environment(loader=FileSystemLoader(template_path), **jenv_opt) sys_info = get_sys_info()
35f32dd2da80Fix XSS reported on Security list
1 file changed · +3 −1
notebook/notebookapp.py+3 −1 modified@@ -159,7 +159,9 @@ def init_settings(self, ipython_app, kernel_manager, contents_manager, _template_path = (_template_path,) template_path = [os.path.expanduser(path) for path in _template_path] - jenv_opt = jinja_env_options if jinja_env_options else {} + jenv_opt = {"autoescape": True} + jenv_opt.update(jinja_env_options if jinja_env_options else {}) + env = Environment(loader=FileSystemLoader(template_path), **jenv_opt) sys_info = get_sys_info()
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
14- seclists.org/oss-sec/2015/q3/544nvdMailing ListPatchWEB
- github.com/jupyter/notebook/commit/dd9876381f0ef09873d8c5f6f2063269172331e3nvdIssue TrackingPatchWEB
- github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892nvdExploitWEB
- github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ednvdExploitWEB
- lists.fedoraproject.org/pipermail/package-announce/2015-September/166460.htmlnvdThird Party AdvisoryWEB
- lists.fedoraproject.org/pipermail/package-announce/2015-September/166471.htmlnvdThird Party AdvisoryWEB
- lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.htmlnvdThird Party AdvisoryWEB
- lists.opensuse.org/opensuse-updates/2015-10/msg00016.htmlnvdThird Party AdvisoryWEB
- github.com/advisories/GHSA-4vwq-x64q-j4cjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2015-6938ghsaADVISORY
- seclists.org/oss-sec/2015/q3/474nvdWEB
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingWEB
- github.com/pypa/advisory-database/tree/main/vulns/ipython/PYSEC-2015-24.yamlghsaWEB
- github.com/pypa/advisory-database/tree/main/vulns/notebook/PYSEC-2015-26.yamlghsaWEB
News mentions
0No linked articles in our index yet.