An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 10 Oct 2024 02:00:00 +0000

Type Values Removed Values Added
Metrics threat_severity

None

threat_severity

Important


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T21:17:30.550Z

Reserved: 2019-02-15T00:00:00

Link: CVE-2019-8341

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-02-15T07:29:00.257

Modified: 2024-11-21T04:49:43.157

Link: CVE-2019-8341

cve-icon Redhat

Severity : Important

Publid Date: 2019-02-14T00:00:00Z

Links: CVE-2019-8341 - Bugzilla

cve-icon OpenCVE Enrichment

No data.