From 20ad28454747750ab8274e59137df83118ec7b19 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Lum=C3=ADr=20=27Frenzy=27=20Balhar?= Date: Wed, 8 Jan 2025 14:32:15 +0100 Subject: [PATCH] Improve GHSA-gmj6-6f8f-6699 --- .../12/GHSA-gmj6-6f8f-6699/GHSA-gmj6-6f8f-6699.json | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/advisories/github-reviewed/2024/12/GHSA-gmj6-6f8f-6699/GHSA-gmj6-6f8f-6699.json b/advisories/github-reviewed/2024/12/GHSA-gmj6-6f8f-6699/GHSA-gmj6-6f8f-6699.json index 99e4b291b8554..5a33e3c4d53d0 100644 --- a/advisories/github-reviewed/2024/12/GHSA-gmj6-6f8f-6699/GHSA-gmj6-6f8f-6699.json +++ b/advisories/github-reviewed/2024/12/GHSA-gmj6-6f8f-6699/GHSA-gmj6-6f8f-6699.json @@ -1,18 +1,14 @@ { "schema_version": "1.4.0", "id": "GHSA-gmj6-6f8f-6699", - "modified": "2024-12-26T20:09:16Z", + "modified": "2024-12-26T20:09:18Z", "published": "2024-12-23T17:54:12Z", "aliases": [ "CVE-2024-56201" ], "summary": "Jinja has a sandbox breakout through malicious filenames", - "details": "A bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used.\n\nTo exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename.", + "details": "A bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used.\n\nTo exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename.\n\nJinja before 3.0.0a1 is not vulnerable as it does not use f-strings for formatting error messages.", "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" - }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" @@ -29,7 +25,7 @@ "type": "ECOSYSTEM", "events": [ { - "introduced": "0" + "introduced": "3.0.0a1" }, { "fixed": "3.1.5"