Описание
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
A flaw was found in Jinja. Python string formatting could allow an attacker to escape the sandbox. The highest threat from this vulnerability is to data confidentiality and integrity and system availability.
Отчет
Red Hat Virtualization Management Appliance includes python-jinja2 as a dependency of ovirt-engine-backend, which only uses it with controlled format strings that are not exploitable. Red Hat Satellite 6 will receive fixes through the underlying Red Hat Enterprise Linux, so it won't issue updates to its own affected package. This issue does not affect versions of python-jinja2 as shipped with:
- Red Hat Enterprise Linux 6, and 7 as python2 does not support str.format_map.
- Red Hat Update Infrastructure as it does not use the Sandbox feature, nor does it allow untrusted jinja2 templates.
- Red Hat Ceph Storage 2, 3 and Red Hat Gluster Storage 3 as python2 does not support str.format_map.
- Red Hat OpenStack Platform 13 or 14 as python2 does not support str.format_map.
Меры по смягчению последствий
If you cannot upgrade python-Jinja2, you can override the is_safe_attribute
method on the sandbox and explicitly disallow the format_map
method on string objects.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Ceph Storage 2 | python-jinja2 | Not affected | ||
Red Hat Ceph Storage 3 | python-jinja2 | Not affected | ||
Red Hat Enterprise Linux 6 | python-jinja2 | Not affected | ||
Red Hat Enterprise Linux 7 | python-jinja2 | Not affected | ||
Red Hat Enterprise Linux 8 | python27:2.7/python-jinja2 | Not affected | ||
Red Hat OpenStack Platform 13 (Queens) | python-jinja2 | Not affected | ||
Red Hat OpenStack Platform 14 (Rocky) | python-jinja2 | Not affected | ||
Red Hat OpenStack Platform 15 (Stein) | python-jinja2 | Not affected | ||
Red Hat Software Collections | python27-python-jinja2 | Not affected | ||
Red Hat Storage 3 | python-jinja2 | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
9 Critical
CVSS3
Связанные уязвимости
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape ...
EPSS
9 Critical
CVSS3