Логотип exploitDog
bind:"CVE-2019-8341"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-8341"

Количество 11

Количество 11

ubuntu логотип

CVE-2019-8341

почти 7 лет назад

An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing

CVSS3: 9.8
EPSS: Средний
redhat логотип

CVE-2019-8341

почти 7 лет назад

An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing

CVSS3: 8.2
EPSS: Средний
nvd логотип

CVE-2019-8341

почти 7 лет назад

An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2019-8341

почти 7 лет назад

An issue was discovered in Jinja2 2.10. The from_string function is pr ...

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-f6pv-j8mr-w6rr

больше 3 лет назад

** DISPUTED ** An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2019-01179

почти 7 лет назад

Уязвимость функции from_string шаблонизатора Jinja2 для языка программирования Python, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

CVSS3: 8.2
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:3096-1

больше 5 лет назад

Security update for python-Jinja2

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1614-1

больше 6 лет назад

Security update for python-Jinja2

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1395-1

больше 6 лет назад

Security update for python-Jinja2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1554-1

больше 6 лет назад

Security update for python-Jinja2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1156-1

почти 7 лет назад

Security update for python-Jinja2

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-8341

An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing

CVSS3: 9.8
37%
Средний
почти 7 лет назад
redhat логотип
CVE-2019-8341

An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing

CVSS3: 8.2
37%
Средний
почти 7 лет назад
nvd логотип
CVE-2019-8341

An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing

CVSS3: 9.8
37%
Средний
почти 7 лет назад
debian логотип
CVE-2019-8341

An issue was discovered in Jinja2 2.10. The from_string function is pr ...

CVSS3: 9.8
37%
Средний
почти 7 лет назад
github логотип
GHSA-f6pv-j8mr-w6rr

** DISPUTED ** An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing.

CVSS3: 9.8
37%
Средний
больше 3 лет назад
fstec логотип
BDU:2019-01179

Уязвимость функции from_string шаблонизатора Jinja2 для языка программирования Python, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

CVSS3: 8.2
37%
Средний
почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2020:3096-1

Security update for python-Jinja2

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1614-1

Security update for python-Jinja2

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1395-1

Security update for python-Jinja2

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1554-1

Security update for python-Jinja2

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1156-1

Security update for python-Jinja2

почти 7 лет назад

Уязвимостей на страницу