First published: Fri Feb 15 2019(Updated: )
** DISPUTED ** An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Jinja2 | =2.10 | |
SUSE Linux | =15.0 | |
SUSE Linux | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-8341 is classified as important due to its potential for Server Side Template Injection (SSTI).
To fix CVE-2019-8341, update Jinja2 to version 2.10.1 or later, which addresses the Server Side Template Injection vulnerability.
CVE-2019-8341 affects Jinja2 version 2.10 and certain versions of openSUSE Leap, specifically 15.0 and 42.3.
CVE-2019-8341 allows attackers to perform Server Side Template Injection, enabling them to execute arbitrary commands by injecting template commands.
Yes, CVE-2019-8341 is a recognized vulnerability that has been reported and discussed within the cybersecurity community.