Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-28493

Опубликовано: 01 фев. 2021
Источник: redhat
CVSS3: 7.5

Описание

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the _punctuation_re regex operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

A flaw was found in python-jinja2. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9.-]+.[a-zA-Z0-9.-]+. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

Отчет

This flaw is out of support scope for the following products:

  • Red Hat Enterprise Linux 6
  • Red Hat Enterprise Linux 7
  • Red Hat Ceph Storage 2 To learn more about Red Hat Enterprise Linux support scopes, please see https://access.redhat.com/support/policy/updates/errata/ In Red Hat OpenStack Platform, because python-jinja2 is not directly customer exposed, the Impact has been moved to Low and no updated will be provided at this time for the RHOSP python-jinja2 package. Red Hat Quay does not make use of the vulnerable function, so the impact is Low.

Меры по смягчению последствий

If using the jinja2 library as a developer, this flaw can be mitigated by not using the vulnerable urlize() filter, and instead, using Markdown to format user content.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 1.2jinja2Not affected
Red Hat Ansible Automation Platform 1.2python-jinja2Not affected
Red Hat Ansible Tower 3jinja2Not affected
Red Hat Ceph Storage 2python-jinja2Out of support scope
Red Hat Ceph Storage 3python-jinja2Affected
Red Hat Enterprise Linux 6python-jinja2Out of support scope
Red Hat Enterprise Linux 7python-jinja2Out of support scope
Red Hat Enterprise Linux 9python-jinja2Not affected
Red Hat OpenStack Platform 13 (Queens)python-jinja2Will not fix
Red Hat Quay 3quay/quay-rhel8Affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1928707python-jinja2: ReDoS vulnerability in the urlize filter

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 4 лет назад

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

CVSS3: 5.3
nvd
больше 4 лет назад

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

CVSS3: 5.3
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 5.3
debian
больше 4 лет назад

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDo ...

suse-cvrf
больше 4 лет назад

Security update for python-Jinja2

7.5 High

CVSS3