Логотип exploitDog
bind:"GHSA-cpwx-vrp4-4pq7" OR bind:"CVE-2025-27516"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-cpwx-vrp4-4pq7" OR bind:"CVE-2025-27516"

Количество 15

Количество 15

github логотип

GHSA-cpwx-vrp4-4pq7

5 месяцев назад

Jinja2 vulnerable to sandbox breakout through attr filter selecting format method

EPSS: Низкий
ubuntu логотип

CVE-2025-27516

5 месяцев назад

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

EPSS: Низкий
redhat логотип

CVE-2025-27516

5 месяцев назад

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2025-27516

5 месяцев назад

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

EPSS: Низкий
msrc логотип

CVE-2025-27516

5 месяцев назад

EPSS: Низкий
debian логотип

CVE-2025-27516

5 месяцев назад

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight ...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1004-1

5 месяцев назад

Security update for python-Jinja2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0956-1

5 месяцев назад

Security update for python-Jinja2

EPSS: Низкий
redos логотип

ROS-20250430-07

3 месяца назад

Уязвимость python3-jinja2

CVSS3: 7.3
EPSS: Низкий
rocky логотип

RLSA-2025:3388

10 дней назад

Important: python-jinja2 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7476

около 1 месяца назад

ELSA-2025-7476: python-jinja2 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-3406

4 месяца назад

ELSA-2025-3406: python-jinja2 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-3388

4 месяца назад

ELSA-2025-3388: python-jinja2 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-3113

5 месяцев назад

ELSA-2025-3113: fence-agents security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2025-06562

5 месяцев назад

Уязвимость компилятора инструмента для html-шаблонизации jinja, связанная с непринятием мер по нейтрализации специальных элементов в механизме создания шаблонов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-cpwx-vrp4-4pq7

Jinja2 vulnerable to sandbox breakout through attr filter selecting format method

0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-27516

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-27516

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

CVSS3: 7.3
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-27516

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

0%
Низкий
5 месяцев назад
msrc логотип
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-27516

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight ...

0%
Низкий
5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1004-1

Security update for python-Jinja2

0%
Низкий
5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0956-1

Security update for python-Jinja2

0%
Низкий
5 месяцев назад
redos логотип
ROS-20250430-07

Уязвимость python3-jinja2

CVSS3: 7.3
0%
Низкий
3 месяца назад
rocky логотип
RLSA-2025:3388

Important: python-jinja2 security update

0%
Низкий
10 дней назад
oracle-oval логотип
ELSA-2025-7476

ELSA-2025-7476: python-jinja2 security update (IMPORTANT)

около 1 месяца назад
oracle-oval логотип
ELSA-2025-3406

ELSA-2025-3406: python-jinja2 security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-3388

ELSA-2025-3388: python-jinja2 security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-3113

ELSA-2025-3113: fence-agents security update (IMPORTANT)

5 месяцев назад
fstec логотип
BDU:2025-06562

Уязвимость компилятора инструмента для html-шаблонизации jinja, связанная с непринятием мер по нейтрализации специальных элементов в механизме создания шаблонов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.3
0%
Низкий
5 месяцев назад

Уязвимостей на страницу