python-jinja2-2.10.1-4.el8

エラータID: AXSA:2024-8289:02

Release date: 
Monday, June 17, 2024 - 15:59
Subject: 
python-jinja2-2.10.1-4.el8
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment.

Security Fix(es):

* jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Asianux Server 8.10 Release Notes linked from the References section.

CVE-2024-22195
Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. python-jinja2-2.10.1-4.el8.src.rpm
    MD5: ff645d31d01e4fc9bf3a54e5b71bdd95
    SHA-256: f17033e422544bb588240758eacf2793dff82e35c403501c6de20efb787efbbc
    Size: 276.45 kB

Asianux Server 8 for x86_64
  1. python3-jinja2-2.10.1-4.el8.noarch.rpm
    MD5: 5ddd49b682fc68c3babc604417d0198a
    SHA-256: 9cc84fd8c33ebf31236c577380ec7d2475c648b42470a3679a0240c458f7676f
    Size: 536.75 kB