Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-56201

Опубликовано: 23 дек. 2024
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

Jinja is an extensible templating engine. In versions on the 3.x branch prior to 3.1.5, a bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used. To exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename. This vulnerability is fixed in 3.1.5.

A flaw was found in the Jinja2 package. A bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of Jinja's sandbox being used. An attacker needs to be able to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications that execute untrusted templates where the template author can also choose the template filename.

Отчет

This vulnerability has rated as a IMPORTANT flaw because an attacker controlling both the template content and filename to execute arbitrary Python code, bypassing the sandbox.

Меры по смягчению последствий

To mitigate this vulnerabilty restrict user-controlled template filenames, ensuring they follow a predefined templates.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Lightspeedopenshift-lightspeed-tech-preview/lightspeed-service-api-rhel9Affected
Red Hat Ansible Automation Platform 1.2ansible-towerWill not fix
Red Hat Ansible Automation Platform 2aap-cloud-metrics-collector-containerNot affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-supported-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-dellemc-openmanage-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/platform-resource-runner-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-25/ansible-dev-tools-rhel8Not affected
Red Hat Developer Hubrhdh/rhdh-rhel9-operatorNot affected
Red Hat Enterprise Linux 10flatpak-sdk-containerNot affected
Red Hat Enterprise Linux 10python-jinja2Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-150
https://bugzilla.redhat.com/show_bug.cgi?id=2333854jinja2: Jinja has a sandbox breakout through malicious filenames

EPSS

Процентиль: 20%
0.00064
Низкий

7.3 High

CVSS3

Связанные уязвимости

ubuntu
6 месяцев назад

Jinja is an extensible templating engine. In versions on the 3.x branch prior to 3.1.5, a bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used. To exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename. This vulnerability is fixed in 3.1.5.

nvd
6 месяцев назад

Jinja is an extensible templating engine. In versions on the 3.x branch prior to 3.1.5, a bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used. To exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename. This vulnerability is fixed in 3.1.5.

CVSS3: 8.8
msrc
5 месяцев назад

Описание отсутствует

debian
6 месяцев назад

Jinja is an extensible templating engine. In versions on the 3.x branc ...

CVSS3: 8.8
github
6 месяцев назад

Jinja has a sandbox breakout through malicious filenames

EPSS

Процентиль: 20%
0.00064
Низкий

7.3 High

CVSS3

Уязвимость CVE-2024-56201