Описание
Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions earlier than 1.5.7 are impacted by a remote code execution vulnerability. Nautobot did not properly sandbox Jinja2 template rendering. In Nautobot 1.5.7 has enabled sandboxed environments for the Jinja2 template engine used internally for template rendering for the following objects: extras.ComputedField, extras.CustomLink, extras.ExportTemplate, extras.Secret, extras.Webhook. While no active exploits of this vulnerability are known this change has been made as a preventative measure to protect against any potential remote code execution attacks utilizing maliciously crafted template code. This change forces the Jinja2 template engine to use a SandboxedEnvironment on all new installations of Nautobot. This addresses any potential unsafe code execution everywhere the helper function nautobot.utilities.utils.render_jinja2 is called. Additionally, the documentation that had
Ссылки
- Patch
- Vendor Advisory
- Product
- Patch
- Vendor Advisory
- Product
Уязвимые конфигурации
EPSS
7.5 High
CVSS3
9.8 Critical
CVSS3
Дефекты
Связанные уязвимости
Nautobot vulnerable to remote code execution via Jinja2 template rendering
EPSS
7.5 High
CVSS3
9.8 Critical
CVSS3