git: 414eee6e27a6 - main - security/vuxml: add devel/py-Jinja2 <= 3.1.5
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 06 Mar 2025 09:44:08 UTC
The branch main has been updated by nivit: URL: https://cgit.FreeBSD.org/ports/commit/?id=414eee6e27a6f049d238182c3ae350c65d9fc93a commit 414eee6e27a6f049d238182c3ae350c65d9fc93a Author: Nicola Vitale <nivit@FreeBSD.org> AuthorDate: 2025-03-06 09:40:26 +0000 Commit: Nicola Vitale <nivit@FreeBSD.org> CommitDate: 2025-03-06 09:44:04 +0000 security/vuxml: add devel/py-Jinja2 <= 3.1.5 --- security/vuxml/vuln/2025.xml | 41 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 10e4a5386ee2..c3e490f46f5a 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,44 @@ + <vuln vid="3299cbfd-fa6e-11ef-929d-b0416f0c4c67"> + <topic>Jinja2 -- Sandbox breakout through attr filter selecting format method</topic> + <affects> + <package> + <name>py38-Jinja2</name> + <name>py39-Jinja2</name> + <name>py310-Jinja2</name> + <name>py311-Jinja2</name> + <range><lt>3.1.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>security-advisories@github.com reports:</p> + <blockquote cite="https://github.com/pallets/jinja/commit/90457bbf33b8662926ae65cdde4c4c32e756e403"> + <p>Jinja is an extensible templating engine. Prior to 3.1.6, an + oversight in how the Jinja sandboxed environment interacts with the + |attr filter allows an attacker that controls the content of a + template to execute arbitrary Python code. To exploit the + vulnerability, an attacker needs to control the content of a template. + Whether that is the case depends on the type of application using + Jinja. This vulnerability impacts users of applications which + execute untrusted templates. Jinja's sandbox does catch calls + to str.format and ensures they don't escape the sandbox. + However, it's possible to use the |attr filter to get a reference + to a string's plain format method, bypassing the sandbox. + After the fix, the |attr filter no longer bypasses the environment's + attribute lookup. This vulnerability is fixed in 3.1.6.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-27516</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2025-27516</url> + </references> + <dates> + <discovery>2025-03-05</discovery> + <entry>2025-03-06</entry> + </dates> + </vuln> + <vuln vid="f4297478-fa62-11ef-b597-001fc69cd6dc"> <topic>xorg server -- Multiple vulnerabilities</topic> <affects>