Логотип exploitDog
bind:"BDU:2025-06562" OR bind:"CVE-2025-27516"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-06562" OR bind:"CVE-2025-27516"

Количество 13

Количество 13

fstec логотип

BDU:2025-06562

4 месяца назад

Уязвимость компилятора инструмента для html-шаблонизации jinja, связанная с непринятием мер по нейтрализации специальных элементов в механизме создания шаблонов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.3
EPSS: Низкий
ubuntu логотип

CVE-2025-27516

4 месяца назад

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

EPSS: Низкий
redhat логотип

CVE-2025-27516

4 месяца назад

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2025-27516

4 месяца назад

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

EPSS: Низкий
msrc логотип

CVE-2025-27516

3 месяца назад

EPSS: Низкий
debian логотип

CVE-2025-27516

4 месяца назад

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight ...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1004-1

3 месяца назад

Security update for python-Jinja2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0956-1

3 месяца назад

Security update for python-Jinja2

EPSS: Низкий
redos логотип

ROS-20250430-07

около 2 месяцев назад

Уязвимость python3-jinja2

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-cpwx-vrp4-4pq7

4 месяца назад

Jinja2 vulnerable to sandbox breakout through attr filter selecting format method

EPSS: Низкий
oracle-oval логотип

ELSA-2025-3406

3 месяца назад

ELSA-2025-3406: python-jinja2 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-3388

3 месяца назад

ELSA-2025-3388: python-jinja2 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-3113

3 месяца назад

ELSA-2025-3113: fence-agents security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-06562

Уязвимость компилятора инструмента для html-шаблонизации jinja, связанная с непринятием мер по нейтрализации специальных элементов в механизме создания шаблонов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.3
0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-27516

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-27516

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

CVSS3: 7.3
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-27516

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

0%
Низкий
4 месяца назад
msrc логотип
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-27516

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight ...

0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:1004-1

Security update for python-Jinja2

0%
Низкий
3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0956-1

Security update for python-Jinja2

0%
Низкий
3 месяца назад
redos логотип
ROS-20250430-07

Уязвимость python3-jinja2

CVSS3: 7.3
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-cpwx-vrp4-4pq7

Jinja2 vulnerable to sandbox breakout through attr filter selecting format method

0%
Низкий
4 месяца назад
oracle-oval логотип
ELSA-2025-3406

ELSA-2025-3406: python-jinja2 security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-3388

ELSA-2025-3388: python-jinja2 security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-3113

ELSA-2025-3113: fence-agents security update (IMPORTANT)

3 месяца назад

Уязвимостей на страницу