CVE-2019-8341

NameCVE-2019-8341
DescriptionAn issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
jinja2 (PTS)jessie, jessie (lts)2.7.3-1+deb8u1vulnerable
stretch (lts), stretch2.8-1+deb9u1vulnerable
buster2.10-2vulnerable
buster (security)2.10-2+deb10u1vulnerable
bullseye2.11.3-1vulnerable
bookworm3.1.2-1vulnerable
sid, trixie3.1.3-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
jinja2source(unstable)(unfixed)unimportant

Notes

https://github.com/JameelNabbo/Jinja2-Code-execution
No real security impact and upstream indicates the CVE is invalid

Search for package or bug name: Reporting problems