First published: Thu Jan 09 2014(Updated: )
Jinja2, a template engine written in pure python, was found to use /tmp as a default directory for jinja2.bccache.FileSystemBytecodeCache, which is insecure because the /tmp directory is world-writable and the filenames used by FileSystemBytecodeCache are predictable. A malicious local user could exploit this bug to alter output generated by other user's application using Jinja2 or possibly, execute arbitrary code as another user. References: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pocoo Jinja2 | <=2.7.1 | |
Pocoo Jinja2 | =2.0 | |
Pocoo Jinja2 | =2.0-rc1 | |
Pocoo Jinja2 | =2.1 | |
Pocoo Jinja2 | =2.1.1 | |
Pocoo Jinja2 | =2.2 | |
Pocoo Jinja2 | =2.2.1 | |
Pocoo Jinja2 | =2.3 | |
Pocoo Jinja2 | =2.3.1 | |
Pocoo Jinja2 | =2.4 | |
Pocoo Jinja2 | =2.4.1 | |
Pocoo Jinja2 | =2.5 | |
Pocoo Jinja2 | =2.5.1 | |
Pocoo Jinja2 | =2.5.2 | |
Pocoo Jinja2 | =2.5.3 | |
Pocoo Jinja2 | =2.5.4 | |
Pocoo Jinja2 | =2.5.5 | |
Pocoo Jinja2 | =2.6 | |
Pocoo Jinja2 | =2.7 | |
pip/Jinja2 | <2.7.2 | 2.7.2 |
redhat/python-jinja2 | <2.7.3 | 2.7.3 |
debian/jinja2 | 2.11.3-1 3.1.2-1 3.1.3-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.