Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-8341

Опубликовано: 14 фев. 2019
Источник: redhat
CVSS3: 8.2
EPSS Средний

Описание

An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing

Отчет

Red Hat Product Security does not believe this CVE assignment is valid. To the best of our knowledge, Jinja2 does not make any guarantees about being able to safely handle untrusted data by default without sandboxing modes enabled.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2python-jinja2Not affected
Red Hat Ceph Storage 3python-jinja2Not affected
Red Hat Enterprise Linux 6python-jinja2Not affected
Red Hat Enterprise Linux 7python-jinja2Not affected
Red Hat Enterprise Linux 8python-jinja2Not affected
Red Hat OpenStack Platform 13 (Queens)python-jinja2Not affected
Red Hat OpenStack Platform 14 (Rocky)python-jinja2Not affected
Red Hat Satellite 6python-jinja2Not affected
Red Hat Storage 3python-jinja2Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=1677653python-jinja2: command injection in function from_string

EPSS

Процентиль: 97%
0.36588
Средний

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 7 лет назад

An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing

CVSS3: 9.8
nvd
почти 7 лет назад

An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing

CVSS3: 9.8
debian
почти 7 лет назад

An issue was discovered in Jinja2 2.10. The from_string function is pr ...

CVSS3: 9.8
github
больше 3 лет назад

** DISPUTED ** An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing.

CVSS3: 8.2
fstec
почти 7 лет назад

Уязвимость функции from_string шаблонизатора Jinja2 для языка программирования Python, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

EPSS

Процентиль: 97%
0.36588
Средний

8.2 High

CVSS3