Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-28493

Опубликовано: 01 фев. 2021
Источник: debian
EPSS Низкий

Описание

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jinja2fixed2.11.3-1package
jinja2no-dsabusterpackage
jinja2no-dsastretchpackage

Примечания

  • https://github.com/pallets/jinja/pull/1343

  • https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994

EPSS

Процентиль: 43%
0.00207
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 4 лет назад

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

CVSS3: 7.5
redhat
больше 4 лет назад

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

CVSS3: 5.3
nvd
больше 4 лет назад

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

CVSS3: 5.3
msrc
около 3 лет назад

Описание отсутствует

suse-cvrf
больше 4 лет назад

Security update for python-Jinja2

EPSS

Процентиль: 43%
0.00207
Низкий