Intel

AIKIDO-2024-10560

jinja2 is vulnerable to Code Injection

Code InjectionCVE-2024-56326

54

Medium Risk

This Affects:

pythonjinja2
2.10.0 - 3.1.4
Fixed in 3.1.5

TL;DR

Affected versions of this package are affected by Code Injection due to a bypass in Jinja's sandbox validation that restricts direct calls to str.format possible by storing a reference to the format method of a malicious string and invoking it indirectly through a filter. This flaw allows an attacker to manipulate a template's content to execute arbitrary code.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

jinja2 is vulnerable to Code Injection in versions 2.10.0 - 3.1.4.

How to fix this

Upgrade the jinja2 library to the patch version.

Background Info