Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-10745

Опубликовано: 29 дек. 2016
Источник: redhat
CVSS3: 9
EPSS Низкий

Описание

In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.

A flaw was found in Pallets Jinja prior to version 2.8.1 allows sandbox escape. Python's string format method added to strings can be used to discover potentially dangerous values including configuration values. The highest threat from this vulnerability is to data confidentiality and integrity as well as system integrity.

Отчет

  • Red Hat OpenStack Platform is not affected by this flaw. All supported versions ship python-jinja2 packages which have already been fixed.
  • Red Hat Satellite 6 will receive fixes through the underlying Red Hat Enterprise Linux, so it will not issue updates to its own affected package.
  • Red Hat Update Infrastructure is not affected because its packaged versions of python-jinja2 do not use the Sandbox feature, nor does it allow untrusted jinja2 templates.
  • Red Hat Virtualization Management Appliance includes python-jinja2 as a dependency of ovirt-engine-backend, which only uses it with controlled format strings that are not exploitable.
  • Red Hat Ceph Storage 2 and 3 are affected by this flaw as it contains the vulnerable code and will get security fixes for python-jinja2 from Red Hat Enterprise Linux 7 channel.

Меры по смягчению последствий

If you don't want or you cannot upgrade Jinja2, you can override the is_safe_attribute method on the sandbox and explicitly disallow all format attributes on strings.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2python-jinja2Will not fix
Red Hat Ceph Storage 3python-jinja2Will not fix
Red Hat Enterprise Linux 6python-jinja2Will not fix
Red Hat Enterprise Linux 8python27:2.7/python-jinja2Not affected
Red Hat Enterprise Linux 8python-jinja2Not affected
Red Hat OpenStack Platform 13 (Queens)python-jinja2Not affected
Red Hat OpenStack Platform 14 (Rocky)python-jinja2Not affected
Red Hat OpenStack Platform 15 (Stein)python-jinja2Not affected
Red Hat Software Collectionsrh-python36-python-jinja2Not affected
Red Hat Storage 3python-jinja2Affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-138
https://bugzilla.redhat.com/show_bug.cgi?id=1698345python-jinja2: Sandbox escape due to information disclosure via str.format

EPSS

Процентиль: 77%
0.01022
Низкий

9 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
почти 7 лет назад

In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.

CVSS3: 8.6
nvd
почти 7 лет назад

In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.

CVSS3: 8.6
debian
почти 7 лет назад

In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.

suse-cvrf
больше 6 лет назад

Security update for python-Jinja2

CVSS3: 8.6
github
почти 7 лет назад

Jinja2 sandbox escape vulnerability

EPSS

Процентиль: 77%
0.01022
Низкий

9 Critical

CVSS3

Уязвимость CVE-2016-10745