VYPR

rpm package

suse/python-Jinja2&distro=SUSE OpenStack Cloud 7

pkg:rpm/suse/python-Jinja2&distro=SUSE%20OpenStack%20Cloud%207

Vulnerabilities (4)

  • CVE-2020-28493Feb 1, 2021
    affected < 2.8-22.11.1fixed 2.8-22.11.1

    This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be miti

  • CVE-2016-10745Apr 8, 2019
    affected < 2.8-22.8.1fixed 2.8-22.8.1

    In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.

  • CVE-2019-10906Apr 6, 2019
    affected < 2.8-22.8.1fixed 2.8-22.8.1

    In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.

  • CVE-2019-8341Feb 15, 2019
    affected < 2.8-22.8.1fixed 2.8-22.8.1

    An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: