Lucene search

K
osvGoogleOSV:GHSA-462W-V97R-4M45
HistoryApr 10, 2019 - 2:30 p.m.

Jinja2 sandbox escape via string formatting

2019-04-1014:30:24
Google
osv.dev
9

8.4 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.2%

In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.

The sandbox is used to restrict what code can be evaluated when rendering untrusted, user-provided templates. Due to the way string formatting works in Python, the str.format_map method could be used to escape the sandbox.

This issue was previously addressed for the str.format method in Jinja 2.8.1, which discusses the issue in detail. However, the less-common str.format_map method was overlooked. This release applies the same sandboxing to both methods.

If you cannot upgrade Jinja, you can override the is_safe_attribute method on the sandbox and explicitly disallow the format_map method on string objects.

Rows per page:
1-10 of 311

References