Description
An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Thu, 10 Oct 2024 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
threat_severity
|
threat_severity
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T21:17:30.550Z
Reserved: 2019-02-15T00:00:00.000Z
Link: CVE-2019-8341
No data.
Status : Modified
Published: 2019-02-15T07:29:00.257
Modified: 2024-11-21T04:49:43.157
Link: CVE-2019-8341
OpenCVE Enrichment
No data.