CVE-2024-56201

 

Jinja is an extensible templating engine. In versions on the 3.x branch prior to 3.1.5, a bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used. To exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename. This vulnerability is fixed in 3.1.5.
https://nvd.nist.gov/vuln/detail/CVE-2024-56201

Categories

CWE-150 : Improper Neutralization of Escape, Meta, or Control Sequences
As data is parsed, an injected/absent/malformed delimiter may cause the process to take unexpected actions.

References


 

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
134 Email Injection
Medium
41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
High
81 Web Server Logs Tampering
High
93 Log Injection-Tampering-Forging
High