Use of Externally-Controlled Format String Affecting jinja2 package, versions <2.9.4-1
Threat Intelligence
EPSS
0.43% (75th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-JINJA2-342716
- published 8 Apr 2019
- disclosed 8 Apr 2019
Introduced: 8 Apr 2019
CVE-2016-10745 Open this link in a new tabHow to fix?
Upgrade Debian:unstable jinja2 to version 2.9.4-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream jinja2 package and not the jinja2 package as distributed by Debian.
See How to fix? for Debian:unstable relevant fixed versions and status.
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
References
- https://security-tracker.debian.org/tracker/CVE-2016-10745
- https://github.com/pallets/jinja/commit/9b53045c34e61013dc8f09b7e52a555fa16bed16
- https://palletsprojects.com/blog/jinja-281-released/
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html
- https://access.redhat.com/errata/RHSA-2019:3964
- https://access.redhat.com/errata/RHSA-2019:4062
- https://access.redhat.com/errata/RHSA-2019:1022
- https://access.redhat.com/errata/RHSA-2019:1237
- https://access.redhat.com/errata/RHSA-2019:1260
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-10745
- https://usn.ubuntu.com/4011-1/
- https://usn.ubuntu.com/4011-2/