Vulnerabilites related to pocoo - jinja2
Vulnerability from fkie_nvd
Published
2014-05-19 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
FileSystemBytecodeCache in Jinja2 2.7.2 does not properly create temporary directories, which allows local users to gain privileges by pre-creating a temporary directory with a user's uid. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1402.
Impacted products
Vendor Product Version
pocoo jinja2 2.7.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E22D331-9917-4E29-9FDD-4907337D7948",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "FileSystemBytecodeCache in Jinja2 2.7.2 does not properly create temporary directories, which allows local users to gain privileges by pre-creating a temporary directory with a user\u0027s uid.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1402."
    },
    {
      "lang": "es",
      "value": "FileSystemBytecodeCache en Jinja2 2.7.2 no crea debidamente directorios temporales, lo que permite a usuarios locales ganar privilegios mediante la previa creaci\u00f3n de un directorio temporal con el identificador de un usuario. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE-2014-1402."
    }
  ],
  "id": "CVE-2014-0012",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-19T14:55:10.330",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/oss-sec/2014/q1/73"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/56328"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/60738"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051421"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/mitsuhiko/jinja2/commit/acb672b6a179567632e032f547582f30fa2f4aa7"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://github.com/mitsuhiko/jinja2/pull/292"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://github.com/mitsuhiko/jinja2/pull/296"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2014/q1/73"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56328"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60738"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051421"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/mitsuhiko/jinja2/commit/acb672b6a179567632e032f547582f30fa2f4aa7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/mitsuhiko/jinja2/pull/292"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/mitsuhiko/jinja2/pull/296"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-02-15 07:29
Modified
2024-11-21 04:49
Severity ?
Summary
An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing
Impacted products
Vendor Product Version
pocoo jinja2 2.10
opensuse leap 15.0
opensuse leap 42.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "75EB0D19-348A-4840-AA7F-624FCB3C8B62",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the \"source\" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn\u0027t valid because users shouldn\u0027t use untrusted templates without sandboxing"
    },
    {
      "lang": "es",
      "value": "** EN DISPUTA ** Se ha descubierto un problema en Jinja2 2.10. La funci\u00f3n from_string es propensa a una Server Side Template Injection (SSTI), donde toma el par\u00e1metro \"source\" como objeto de plantilla, lo renderiza y lo devuelve. El atacante puede explotar esto mediante {{COMANDOS DE INYECCI\u00d3N}} en un URI.NOTA: El mantenedor de software y varios terceros creen que esta vulnerabilidad no es v\u00e1lida porque los usuarios no deben usar plantillas no confiables sin sandboxing."
    }
  ],
  "id": "CVE-2019-8341",
  "lastModified": "2024-11-21T04:49:43.157",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-02-15T07:29:00.257",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677653"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.suse.com/show_bug.cgi?id=1125815"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://github.com/JameelNabbo/Jinja2-Code-execution"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/46386/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.suse.com/show_bug.cgi?id=1125815"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://github.com/JameelNabbo/Jinja2-Code-execution"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/46386/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-19 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
The default configuration for bccache.FileSystemBytecodeCache in Jinja2 before 2.7.2 does not properly create temporary files, which allows local users to gain privileges via a crafted .cache file with a name starting with __jinja2_ in /tmp.
References
cve@mitre.orghttp://advisories.mageia.org/MGASA-2014-0028.html
cve@mitre.orghttp://jinja.pocoo.org/docs/changelog/
cve@mitre.orghttp://openwall.com/lists/oss-security/2014/01/10/2
cve@mitre.orghttp://openwall.com/lists/oss-security/2014/01/10/3
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2014-0747.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2014-0748.html
cve@mitre.orghttp://secunia.com/advisories/56287
cve@mitre.orghttp://secunia.com/advisories/58783
cve@mitre.orghttp://secunia.com/advisories/58918
cve@mitre.orghttp://secunia.com/advisories/59017
cve@mitre.orghttp://secunia.com/advisories/60738
cve@mitre.orghttp://secunia.com/advisories/60770
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-201408-13.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2014:096
cve@mitre.orghttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=1051421
cve@mitre.orghttps://oss.oracle.com/pipermail/el-errata/2014-June/004192.html
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2014-0028.html
af854a3a-2127-422b-91ae-364da2661108http://jinja.pocoo.org/docs/changelog/
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2014/01/10/2
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2014/01/10/3
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0747.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0748.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56287
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/58783
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/58918
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59017
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60738
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60770
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2014:096
af854a3a-2127-422b-91ae-364da2661108https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1051421
af854a3a-2127-422b-91ae-364da2661108https://oss.oracle.com/pipermail/el-errata/2014-June/004192.html
Impacted products
Vendor Product Version
pocoo jinja2 *
pocoo jinja2 2.0
pocoo jinja2 2.0
pocoo jinja2 2.1
pocoo jinja2 2.1.1
pocoo jinja2 2.2
pocoo jinja2 2.2.1
pocoo jinja2 2.3
pocoo jinja2 2.3.1
pocoo jinja2 2.4
pocoo jinja2 2.4.1
pocoo jinja2 2.5
pocoo jinja2 2.5.1
pocoo jinja2 2.5.2
pocoo jinja2 2.5.3
pocoo jinja2 2.5.4
pocoo jinja2 2.5.5
pocoo jinja2 2.6
pocoo jinja2 2.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17F89C8-60E2-490D-ADDD-3A3C683DB5EC",
              "versionEndIncluding": "2.7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "5962EB2E-DAEA-4A50-AFDB-162EEA220974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "69E6866B-D562-426B-A4FF-C78EDD04D8D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46E4F0BF-0944-430D-BB84-B42E07F6C8A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D164D2AA-4534-48D5-A90F-47C736FC3E6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1BD2C2-88EB-4D86-8832-71E25F545218",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE6DFCB-BE4D-4204-B666-D4D1EA2EA753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "68085717-AA12-48C8-81AD-DA3ADB17B587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5F7F6E7-584C-4F63-B98B-B71D0F3FDB0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "923F1074-8DB4-454A-BED4-F9BDD080DCC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F020EA-89C9-4A36-A668-493143335391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4812CCD7-5A95-499A-BE99-DAD88EE14902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4E4836B-3047-40A7-A60B-25EE0C7FB537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D6EEDF-76C5-4A79-8035-60940E00E6F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95337AF-4991-4AAE-A9EA-BC881B094717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB314640-C430-4B96-A31E-B98E6F7294F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "471D23E6-02A3-4390-89F7-4342DA18E3D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0443DF18-E8AB-461C-BE64-EE0C6F00EE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pocoo:jinja2:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5173B0E3-F80C-4E9D-9487-CD849A93F258",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The default configuration for bccache.FileSystemBytecodeCache in Jinja2 before 2.7.2 does not properly create temporary files, which allows local users to gain privileges via a crafted .cache file with a name starting with __jinja2_ in /tmp."
    },
    {
      "lang": "es",
      "value": "La configuraci\u00f3n por defecto para bccache.FileSystemBytecodeCache en Jinja2 anterior a 2.7.2 no crea debidamente archivos temporales, lo que permite a usuarios locales ganar privilegios a trav\u00e9s de un archivo .cache manipulado con un nombre que empieza con __jinja2_ en /tmp."
    }
  ],
  "id": "CVE-2014-1402",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-19T14:55:11.517",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://advisories.mageia.org/MGASA-2014-0028.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jinja.pocoo.org/docs/changelog/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2014/01/10/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2014/01/10/3"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0747.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0748.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/56287"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/58783"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/58918"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/59017"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/60738"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/60770"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:096"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051421"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oss.oracle.com/pipermail/el-errata/2014-June/004192.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://advisories.mageia.org/MGASA-2014-0028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jinja.pocoo.org/docs/changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2014/01/10/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2014/01/10/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0747.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0748.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56287"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/58783"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/58918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60738"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:096"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051421"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oss.oracle.com/pipermail/el-errata/2014-June/004192.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-1402 (GCVE-0-2014-1402)
Vulnerability from cvelistv5
Published
2014-05-19 14:00
Modified
2024-08-06 09:42
Severity ?
CWE
  • n/a
Summary
The default configuration for bccache.FileSystemBytecodeCache in Jinja2 before 2.7.2 does not properly create temporary files, which allows local users to gain privileges via a crafted .cache file with a name starting with __jinja2_ in /tmp.
References
https://oss.oracle.com/pipermail/el-errata/2014-June/004192.html mailing-list, x_refsource_MLIST
http://openwall.com/lists/oss-security/2014/01/10/3 mailing-list, x_refsource_MLIST
http://secunia.com/advisories/59017 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/56287 third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2014:096 vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/58783 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/58918 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60738 third-party-advisory, x_refsource_SECUNIA
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747 x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=1051421 x_refsource_CONFIRM
http://secunia.com/advisories/60770 third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2014-0747.html vendor-advisory, x_refsource_REDHAT
http://jinja.pocoo.org/docs/changelog/ x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml vendor-advisory, x_refsource_GENTOO
http://openwall.com/lists/oss-security/2014/01/10/2 mailing-list, x_refsource_MLIST
http://advisories.mageia.org/MGASA-2014-0028.html x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2014-0748.html vendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:42:35.316Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[El-errata] 20140611 Oracle Linux Security Advisory ELSA-2014-0747",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://oss.oracle.com/pipermail/el-errata/2014-June/004192.html"
          },
          {
            "name": "[oss-security] 20140110 Re: CVE Request: python-jinja2: arbitrary code execution vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2014/01/10/3"
          },
          {
            "name": "59017",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59017"
          },
          {
            "name": "56287",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56287"
          },
          {
            "name": "MDVSA-2014:096",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:096"
          },
          {
            "name": "58783",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/58783"
          },
          {
            "name": "58918",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/58918"
          },
          {
            "name": "60738",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/60738"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051421"
          },
          {
            "name": "60770",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/60770"
          },
          {
            "name": "RHSA-2014:0747",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0747.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jinja.pocoo.org/docs/changelog/"
          },
          {
            "name": "GLSA-201408-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml"
          },
          {
            "name": "[oss-security] 20140110 CVE Request: python-jinja2: arbitrary code execution vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2014/01/10/2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0028.html"
          },
          {
            "name": "RHSA-2014:0748",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0748.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The default configuration for bccache.FileSystemBytecodeCache in Jinja2 before 2.7.2 does not properly create temporary files, which allows local users to gain privileges via a crafted .cache file with a name starting with __jinja2_ in /tmp."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-21T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[El-errata] 20140611 Oracle Linux Security Advisory ELSA-2014-0747",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://oss.oracle.com/pipermail/el-errata/2014-June/004192.html"
        },
        {
          "name": "[oss-security] 20140110 Re: CVE Request: python-jinja2: arbitrary code execution vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2014/01/10/3"
        },
        {
          "name": "59017",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59017"
        },
        {
          "name": "56287",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56287"
        },
        {
          "name": "MDVSA-2014:096",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:096"
        },
        {
          "name": "58783",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/58783"
        },
        {
          "name": "58918",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/58918"
        },
        {
          "name": "60738",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/60738"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051421"
        },
        {
          "name": "60770",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/60770"
        },
        {
          "name": "RHSA-2014:0747",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0747.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jinja.pocoo.org/docs/changelog/"
        },
        {
          "name": "GLSA-201408-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml"
        },
        {
          "name": "[oss-security] 20140110 CVE Request: python-jinja2: arbitrary code execution vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2014/01/10/2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0028.html"
        },
        {
          "name": "RHSA-2014:0748",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0748.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-1402",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The default configuration for bccache.FileSystemBytecodeCache in Jinja2 before 2.7.2 does not properly create temporary files, which allows local users to gain privileges via a crafted .cache file with a name starting with __jinja2_ in /tmp."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[El-errata] 20140611 Oracle Linux Security Advisory ELSA-2014-0747",
              "refsource": "MLIST",
              "url": "https://oss.oracle.com/pipermail/el-errata/2014-June/004192.html"
            },
            {
              "name": "[oss-security] 20140110 Re: CVE Request: python-jinja2: arbitrary code execution vulnerability",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2014/01/10/3"
            },
            {
              "name": "59017",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59017"
            },
            {
              "name": "56287",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56287"
            },
            {
              "name": "MDVSA-2014:096",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:096"
            },
            {
              "name": "58783",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/58783"
            },
            {
              "name": "58918",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/58918"
            },
            {
              "name": "60738",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/60738"
            },
            {
              "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747",
              "refsource": "CONFIRM",
              "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1051421",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051421"
            },
            {
              "name": "60770",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/60770"
            },
            {
              "name": "RHSA-2014:0747",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0747.html"
            },
            {
              "name": "http://jinja.pocoo.org/docs/changelog/",
              "refsource": "CONFIRM",
              "url": "http://jinja.pocoo.org/docs/changelog/"
            },
            {
              "name": "GLSA-201408-13",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml"
            },
            {
              "name": "[oss-security] 20140110 CVE Request: python-jinja2: arbitrary code execution vulnerability",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2014/01/10/2"
            },
            {
              "name": "http://advisories.mageia.org/MGASA-2014-0028.html",
              "refsource": "CONFIRM",
              "url": "http://advisories.mageia.org/MGASA-2014-0028.html"
            },
            {
              "name": "RHSA-2014:0748",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0748.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-1402",
    "datePublished": "2014-05-19T14:00:00",
    "dateReserved": "2014-01-10T00:00:00",
    "dateUpdated": "2024-08-06T09:42:35.316Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-0012 (GCVE-0-2014-0012)
Vulnerability from cvelistv5
Published
2014-05-19 14:00
Modified
2024-08-06 08:58
Severity ?
CWE
  • n/a
Summary
FileSystemBytecodeCache in Jinja2 2.7.2 does not properly create temporary directories, which allows local users to gain privileges by pre-creating a temporary directory with a user's uid. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1402.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:58:26.479Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/mitsuhiko/jinja2/pull/292"
          },
          {
            "name": "56328",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56328"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051421"
          },
          {
            "name": "60738",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/60738"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/mitsuhiko/jinja2/commit/acb672b6a179567632e032f547582f30fa2f4aa7"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/mitsuhiko/jinja2/pull/296"
          },
          {
            "name": "GLSA-201408-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml"
          },
          {
            "name": "[oss-security] 20140110 CVE assignment for jinja2",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2014/q1/73"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "FileSystemBytecodeCache in Jinja2 2.7.2 does not properly create temporary directories, which allows local users to gain privileges by pre-creating a temporary directory with a user\u0027s uid.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1402."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-09-12T12:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/mitsuhiko/jinja2/pull/292"
        },
        {
          "name": "56328",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56328"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051421"
        },
        {
          "name": "60738",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/60738"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/mitsuhiko/jinja2/commit/acb672b6a179567632e032f547582f30fa2f4aa7"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/mitsuhiko/jinja2/pull/296"
        },
        {
          "name": "GLSA-201408-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml"
        },
        {
          "name": "[oss-security] 20140110 CVE assignment for jinja2",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2014/q1/73"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-0012",
    "datePublished": "2014-05-19T14:00:00",
    "dateReserved": "2013-12-03T00:00:00",
    "dateUpdated": "2024-08-06T08:58:26.479Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-8341 (GCVE-0-2019-8341)
Vulnerability from cvelistv5
Published
2019-02-15 07:00
Modified
2024-08-04 21:17
Severity ?
CWE
  • n/a
Summary
An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:17:30.550Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/JameelNabbo/Jinja2-Code-execution"
          },
          {
            "name": "46386",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/46386/"
          },
          {
            "name": "openSUSE-SU-2019:1395",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html"
          },
          {
            "name": "openSUSE-SU-2019:1614",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677653"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.suse.com/show_bug.cgi?id=1125815"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-02-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the \"source\" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn\u0027t valid because users shouldn\u0027t use untrusted templates without sandboxing"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-06T14:51:25",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/JameelNabbo/Jinja2-Code-execution"
        },
        {
          "name": "46386",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/46386/"
        },
        {
          "name": "openSUSE-SU-2019:1395",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html"
        },
        {
          "name": "openSUSE-SU-2019:1614",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677653"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.suse.com/show_bug.cgi?id=1125815"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-8341",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED ** An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the \"source\" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn\u0027t valid because users shouldn\u0027t use untrusted templates without sandboxing."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/JameelNabbo/Jinja2-Code-execution",
              "refsource": "MISC",
              "url": "https://github.com/JameelNabbo/Jinja2-Code-execution"
            },
            {
              "name": "46386",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/46386/"
            },
            {
              "name": "openSUSE-SU-2019:1395",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html"
            },
            {
              "name": "openSUSE-SU-2019:1614",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1677653",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677653"
            },
            {
              "name": "https://bugzilla.suse.com/show_bug.cgi?id=1125815",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.suse.com/show_bug.cgi?id=1125815"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-8341",
    "datePublished": "2019-02-15T07:00:00",
    "dateReserved": "2019-02-15T00:00:00",
    "dateUpdated": "2024-08-04T21:17:30.550Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}