jinja2 is vulnerable to Code Injection
54
Medium Risk
Affected versions of this package are affected by Code Injection due to a bypass in Jinja's sandbox validation that restricts direct calls to str.format possible by storing a reference to the format method of a malicious string and invoking it indirectly through a filter. This flaw allows an attacker to manipulate a template's content to execute arbitrary code.
You are affected if you are using a version that falls within the vulnerable range.
jinja2 is vulnerable to Code Injection in versions 2.10.0 - 3.1.4.
Upgrade the jinja2 library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant