You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the _punctuation_re regex operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
dev-mend-for-github-combot
changed the title
Jinja2-2.10-py2.py3-none-any.whl: 2 vulnerabilities (highest severity is: 8.6)
Jinja2-2.10-py2.py3-none-any.whl: 2 vulnerabilities (highest severity is: 8.6) unreachable
Oct 27, 2024
dev-mend-for-github-combot
changed the title
Jinja2-2.10-py2.py3-none-any.whl: 2 vulnerabilities (highest severity is: 8.6) unreachable
Jinja2-2.10-py2.py3-none-any.whl: 2 vulnerabilities (highest severity is: 8.6) reachable
Oct 30, 2024
Vulnerable Library - Jinja2-2.10-py2.py3-none-any.whl
A very fast and expressive template engine.
Library home page: https://files.pythonhosted.org/packages/7f/ff/ae64bacdfc95f27a016a7bed8e8686763ba4d277a78ca76f32659220a731/Jinja2-2.10-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /tmp/ws-ua_20241205192444_NEOWPL/python_IHKSVC/202412051924441/env/lib/python3.7/site-packages/Jinja2-2.10.dist-info
Found in HEAD commit: 5e380d5913a9bd669480cbd6f5a5b0a48e8c14c5
Vulnerabilities
Reachable
Unreachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2019-10906
Vulnerable Library - Jinja2-2.10-py2.py3-none-any.whl
A very fast and expressive template engine.
Library home page: https://files.pythonhosted.org/packages/7f/ff/ae64bacdfc95f27a016a7bed8e8686763ba4d277a78ca76f32659220a731/Jinja2-2.10-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /tmp/ws-ua_20241205192444_NEOWPL/python_IHKSVC/202412051924441/env/lib/python3.7/site-packages/Jinja2-2.10.dist-info
Dependency Hierarchy:
Found in HEAD commit: 5e380d5913a9bd669480cbd6f5a5b0a48e8c14c5
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
Publish Date: 2019-04-06
URL: CVE-2019-10906
CVSS 3 Score Details (8.6)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10906
Release Date: 2019-04-07
Fix Resolution: 2.10.1
In order to enable automatic remediation, please create workflow rules
CVE-2020-28493
Vulnerable Library - Jinja2-2.10-py2.py3-none-any.whl
A very fast and expressive template engine.
Library home page: https://files.pythonhosted.org/packages/7f/ff/ae64bacdfc95f27a016a7bed8e8686763ba4d277a78ca76f32659220a731/Jinja2-2.10-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /tmp/ws-ua_20241205192444_NEOWPL/python_IHKSVC/202412051924441/env/lib/python3.7/site-packages/Jinja2-2.10.dist-info
Dependency Hierarchy:
Found in HEAD commit: 5e380d5913a9bd669480cbd6f5a5b0a48e8c14c5
Found in base branch: master
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the
_punctuation_re regex
operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.Publish Date: 2021-02-01
URL: CVE-2020-28493
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28493
Release Date: 2021-02-01
Fix Resolution: Jinja2 - 2.11.3
In order to enable automatic remediation, please create workflow rules
In order to enable automatic remediation for this issue, please create workflow rules
The text was updated successfully, but these errors were encountered: