CVE-2019-10906

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.

References

http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html

http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html

https://access.redhat.com/errata/RHSA-2019:1152

https://access.redhat.com/errata/RHSA-2019:1237

https://access.redhat.com/errata/RHSA-2019:1329

https://lists.apache.org/thread.html/[email protected]%3Cdevnull.infra.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdevnull.infra.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdevnull.infra.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdevnull.infra.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.airflow.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.airflow.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.airflow.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.airflow.apache.org%3E

https://lists.fedoraproject.org/archives/list/[email protected]/message/DSW3QZMFVVR7YE3UT4YRQA272TYAL5AF/

https://lists.fedoraproject.org/archives/list/[email protected]/message/QCDYIS254EJMBNWOG4S5QY6AOTOR4TZU/

https://lists.fedoraproject.org/archives/list/[email protected]/message/TS7IVZAJBWOHNRDMFJDIZVFCMRP6YIUQ/

https://palletsprojects.com/blog/jinja-2-10-1-released

https://usn.ubuntu.com/4011-1/

https://usn.ubuntu.com/4011-2/

Details

Source: MITRE

Published: 2019-04-07

Updated: 2020-08-24

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Impact Score: 4

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (16 total)

IDNameProductFamilySeverity
149108EulerOS 2.0 SP3 : python-jinja2 (EulerOS-SA-2021-1838)NessusHuawei Local Security Checks
high
145591CentOS 8 : python-jinja2 (CESA-2019:1152)NessusCentOS Local Security Checks
high
141758EulerOS Virtualization 3.0.2.2 : python-jinja2 (EulerOS-SA-2020-2202)NessusHuawei Local Security Checks
high
137986EulerOS Virtualization 3.0.6.0 : python-jinja2 (EulerOS-SA-2020-1767)NessusHuawei Local Security Checks
high
136273EulerOS Virtualization for ARM 64 3.0.2.0 : python-jinja2 (EulerOS-SA-2020-1570)NessusHuawei Local Security Checks
high
133928EulerOS 2.0 SP5 : python-jinja2 (EulerOS-SA-2020-1127)NessusHuawei Local Security Checks
high
128185EulerOS 2.0 SP8 : python-jinja2 (EulerOS-SA-2019-1816)NessusHuawei Local Security Checks
high
127582Oracle Linux 8 : python-jinja2 (ELSA-2019-1152)NessusOracle Linux Local Security Checks
high
126233openSUSE Security Update : python-Jinja2 (openSUSE-2019-1614)NessusSuSE Local Security Checks
critical
125772Ubuntu 14.04 LTS : jinja2 vulnerabilities (USN-4011-2)NessusUbuntu Local Security Checks
high
125771Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : jinja2 vulnerabilities (USN-4011-1)NessusUbuntu Local Security Checks
high
125022openSUSE Security Update : python-Jinja2 (openSUSE-2019-1395)NessusSuSE Local Security Checks
critical
125011RHEL 8 : python-jinja2 (RHSA-2019:1152)NessusRed Hat Local Security Checks
high
124547Fedora 30 : python-jinja2 (2019-e41e19457b)NessusFedora Local Security Checks
high
124350Fedora 28 : python-jinja2 (2019-4f978cacb4)NessusFedora Local Security Checks
high
124346Fedora 29 : python-jinja2 (2019-04a42e480b)NessusFedora Local Security Checks
high