Логотип exploitDog
bind:CVE-2025-59340
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-59340

Количество 3

Количество 3

nvd логотип

CVE-2025-59340

5 месяцев назад

jinjava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Priori to 2.8.1, by using mapper.getTypeFactory().constructFromCanonical(), it is possible to instruct the underlying ObjectMapper to deserialize attacker-controlled input into arbitrary classes. This enables the creation of semi-arbitrary class instances without directly invoking restricted methods or class literals. As a result, an attacker can escape the sandbox and instantiate classes such as java.net.URL, opening up the ability to access local files and URLs(e.g., file:///etc/passwd). With further chaining, this primitive can potentially lead to remote code execution (RCE). This vulnerability is fixed in 2.8.1.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-m49c-g9wr-hv6v

5 месяцев назад

jinjava has Sandbox Bypass via JavaType-Based Deserialization

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2026-00217

5 месяцев назад

Уязвимость функции constructFromCanonical() библиотеки рендеринга шаблонов jinjava, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-59340

jinjava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Priori to 2.8.1, by using mapper.getTypeFactory().constructFromCanonical(), it is possible to instruct the underlying ObjectMapper to deserialize attacker-controlled input into arbitrary classes. This enables the creation of semi-arbitrary class instances without directly invoking restricted methods or class literals. As a result, an attacker can escape the sandbox and instantiate classes such as java.net.URL, opening up the ability to access local files and URLs(e.g., file:///etc/passwd). With further chaining, this primitive can potentially lead to remote code execution (RCE). This vulnerability is fixed in 2.8.1.

CVSS3: 9.8
0%
Низкий
5 месяцев назад
github логотип
GHSA-m49c-g9wr-hv6v

jinjava has Sandbox Bypass via JavaType-Based Deserialization

CVSS3: 9.8
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2026-00217

Уязвимость функции constructFromCanonical() библиотеки рендеринга шаблонов jinjava, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
0%
Низкий
5 месяцев назад

Уязвимостей на страницу