Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk:Medium] jinja2 (Due 04/09/2024 ) #6083

Closed
1 task done
Tracked by #137
pkfec opened this issue Jan 17, 2024 · 1 comment · Fixed by #6119
Closed
1 task done
Tracked by #137

[Snyk:Medium] jinja2 (Due 04/09/2024 ) #6083

pkfec opened this issue Jan 17, 2024 · 1 comment · Fixed by #6119
Assignees
Milestone

Comments

@pkfec
Copy link
Contributor

pkfec commented Jan 17, 2024

Overview

Jinja2 is a template engine written in pure Python. It provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the xmlattr filter, when using keys containing spaces in an application accepts keys as user input. An attacker can inject arbitrary HTML attributes into the rendered HTML template, bypassing the auto-escaping mechanism, which may lead to the execution of untrusted scripts in the context of the user's browser session.

Note Accepting keys as user input is not common or a particularly intended use case of the xmlattr filter, and an application doing so should already be verifying what keys are provided regardless of this fix.

https://app.snyk.io/vuln/SNYK-PYTHON-JINJA2-6150717

Introduced through:

project@0.0.0 › jinja2@3.0.0
project@0.0.0 › django-jinja@2.10.2 › jinja2@3.0.0

Remediation:

Upgrade jinja2 to version 3.1.3

Completion criteria:

  • Upgrade jinja2 to version 3.1.3
@cnlucas
Copy link
Member

cnlucas commented Feb 8, 2024

Screenshot 2024-02-08 at 9 48 48 AM

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: ✅ Done
Development

Successfully merging a pull request may close this issue.

5 participants