python-jinja2-2.10.1-5.el8_10
エラータID: AXSA:2024-8524:03
リリース日:
2024/07/05 Friday - 14:54
題名:
python-jinja2-2.10.1-5.el8_10
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- Jinja2 の xmlattr フィルターには、HTML テンプレート内に
'/'、'>'、および '=' などの非属性文字を挿入できてしまう問題が
あるため、リモートの攻撃者により、細工されたテンプレート
を介して、クロスサイトスクリプティング攻撃を可能とする
脆弱性が存在します。(CVE-2024-34064)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-34064
Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4.
Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4.
追加情報:
N/A
ダウンロード:
SRPMS
- python-jinja2-2.10.1-5.el8_10.src.rpm
MD5: 2d83d8e297f598f401fe8a73baa7ee2e
SHA-256: 4335d419ac31ce8dde012859883d96c59c99e8188b565fb137ff45d32b8899d4
Size: 277.73 kB
Asianux Server 8 for x86_64
- python3-jinja2-2.10.1-5.el8_10.noarch.rpm
MD5: 4cde3289963512eeebd465a77609d319
SHA-256: 77faa40e2f19f5332fade22d009052d072fde32a644cf1163f776b0f5017ab1b
Size: 537.29 kB