ghsa-gmj6-6f8f-6699
Vulnerability from github
Published
2024-12-23 17:54
Modified
2025-01-08 16:06
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.4 (Medium) - CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
5.4 (Medium) - CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Summary
Jinja has a sandbox breakout through malicious filenames
Details
A bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used.
To exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 3.1.4" }, "package": { "ecosystem": "PyPI", "name": "jinja2" }, "ranges": [ { "events": [ { "introduced": "3.0.0" }, { "fixed": "3.1.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-56201" ], "database_specific": { "cwe_ids": [ "CWE-150" ], "github_reviewed": true, "github_reviewed_at": "2024-12-23T17:54:12Z", "nvd_published_at": "2024-12-23T16:15:07Z", "severity": "MODERATE" }, "details": "A bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja\u0027s sandbox is used.\n\nTo exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename.", "id": "GHSA-gmj6-6f8f-6699", "modified": "2025-01-08T16:06:01Z", "published": "2024-12-23T17:54:12Z", "references": [ { "type": "WEB", "url": "https://github.com/pallets/jinja/security/advisories/GHSA-gmj6-6f8f-6699" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56201" }, { "type": "WEB", "url": "https://github.com/pallets/jinja/issues/1792" }, { "type": "WEB", "url": "https://github.com/pallets/jinja/commit/767b23617628419ae3709ccfb02f9602ae9fe51f" }, { "type": "PACKAGE", "url": "https://github.com/pallets/jinja" }, { "type": "WEB", "url": "https://github.com/pallets/jinja/releases/tag/3.1.5" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Jinja has a sandbox breakout through malicious filenames" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.