[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2024-503 --- python-jinja2

ID: oval:org.secpod.oval:def:19500591Date: (C)2024-02-13   (M)2024-02-26
Class: PATCHFamily: unix




Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting . The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based

Platform:
Amazon Linux 2023
Product:
python-jinja2
python3-jinja2
Reference:
ALAS2023-2024-503
CVE-2024-22195
CVE    1
CVE-2024-22195
CPE    2
cpe:/a:pocoo:python_jinja2
cpe:/a:python3-Jinja2:python3-Jinja2

© SecPod Technologies