python-jinja2-2.10.1-5.el8_10
エラータID: AXSA:2024-8524:03
The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment.
Security Fix(es):
* jinja2: accepts keys containing non-attribute characters (CVE-2024-34064)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-34064
Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4.
Update packages.
Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4.
N/A
SRPMS
- python-jinja2-2.10.1-5.el8_10.src.rpm
MD5: 2d83d8e297f598f401fe8a73baa7ee2e
SHA-256: 4335d419ac31ce8dde012859883d96c59c99e8188b565fb137ff45d32b8899d4
Size: 277.73 kB
Asianux Server 8 for x86_64
- python3-jinja2-2.10.1-5.el8_10.noarch.rpm
MD5: 4cde3289963512eeebd465a77609d319
SHA-256: 77faa40e2f19f5332fade22d009052d072fde32a644cf1163f776b0f5017ab1b
Size: 537.29 kB