Source: jinja2
Version: 3.1.2-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 3.1.3-1.1

Hi,

The following vulnerability was published for jinja2.

CVE-2024-56326[0]:
| Jinja is an extensible templating engine. Prior to 3.1.5, An
| oversight in how the Jinja sandboxed environment detects calls to
| str.format allows an attacker that controls the content of a
| template to execute arbitrary Python code. To exploit the
| vulnerability, an attacker needs to control the content of a
| template. Whether that is the case depends on the type of
| application using Jinja. This vulnerability impacts users of
| applications which execute untrusted templates. Jinja's sandbox does
| catch calls to str.format and ensures they don't escape the sandbox.
| However, it's possible to store a reference to a malicious string's
| format method, then pass that to a filter that calls it. No such
| filters are built-in to Jinja, but could be present through custom
| filters in an application. After the fix, such indirect calls are
| also handled by the sandbox. This vulnerability is fixed in 3.1.5.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-56326
    https://www.cve.org/CVERecord?id=CVE-2024-56326
[1] https://github.com/pallets/jinja/security/advisories/GHSA-q2x7-8rv6-6q7h
[2] 
https://github.com/pallets/jinja/commit/48b0687e05a5466a91cd5812d604fa37ad0943b4

Regards,
Salvatore

Reply via email to