跳转到帖子

Rocky Linux: CVE-2024-22195: python-jinja2 (Multiple Advisories)

recommended_posts

发布于
  • Members

Rocky Linux: CVE-2024-22195: python-jinja2 (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
01/11/2024
Created
06/17/2024
Added
06/17/2024
Modified
01/28/2025

Description

Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.

Solution(s)

  • rocky-upgrade-fence-agents-aliyun
  • rocky-upgrade-fence-agents-aliyun-debuginfo
  • rocky-upgrade-fence-agents-all
  • rocky-upgrade-fence-agents-debuginfo
  • rocky-upgrade-fence-agents-debugsource
  • rocky-upgrade-fence-agents-kdump
  • rocky-upgrade-fence-agents-kdump-debuginfo
  • rocky-upgrade-fence-agents-kubevirt
  • rocky-upgrade-fence-agents-kubevirt-debuginfo
  • rocky-upgrade-fence-agents-openstack
  • rocky-upgrade-fence-agents-redfish

References

  • https://attackerkb.com/topics/cve-2024-22195
  • CVE - 2024-22195
  • https://errata.rockylinux.org/RLSA-2024:2968
  • https://errata.rockylinux.org/RLSA-2024:3102
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…