[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-10745Date: (C)2019-06-19   (M)2024-04-18


In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.6CVSS Score : 5.0
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 4.0Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: CHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
RHSA-2019:1022
RHSA-2019:1237
RHSA-2019:1260
RHSA-2019:3964
RHSA-2019:4062
USN-4011-1
USN-4011-2
https://github.com/pallets/jinja/commit/9b53045c34e61013dc8f09b7e52a555fa16bed16
https://palletsprojects.com/blog/jinja-281-released/
openSUSE-SU-2019:1395
openSUSE-SU-2019:1614

CWE    1
CWE-134
OVAL    13
oval:org.secpod.oval:def:1601012
oval:org.secpod.oval:def:504856
oval:org.secpod.oval:def:505112
oval:org.secpod.oval:def:205199
...

© SecPod Technologies