Vulnerability Description
The default configuration of the Jinja templating engine used in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not enable auto-escaping, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via template variables. NOTE: This may be a duplicate of CVE-2015-5216. Moreover, the Jinja development team does not enable auto-escape by default for performance issues as explained in https://jinja.palletsprojects.com/en/master/faq/#why-is-autoescaping-not-the-default.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipsilon-Project | Ipsilon | >= 0.1.0, < 1.0.1 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2015/10/23/10Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1255168Issue TrackingThird Party Advisory
- https://fedorahosted.org/ipsilon/wiki/Releases/v1.0.1Product
- https://pagure.io/ipsilon/a503aa9c2a30a74e709d1c88099befd50fb2eb16Patch
- http://www.openwall.com/lists/oss-security/2015/10/23/10Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1255168Issue TrackingThird Party Advisory
- https://fedorahosted.org/ipsilon/wiki/Releases/v1.0.1Product
- https://pagure.io/ipsilon/a503aa9c2a30a74e709d1c88099befd50fb2eb16Patch
FAQ
What is CVE-2015-5215?
CVE-2015-5215 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The default configuration of the Jinja templating engine used in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not enable auto-escaping, which makes it easier for remote attack...
How severe is CVE-2015-5215?
CVE-2015-5215 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5215?
Check the references section above for vendor advisories and patch information. Affected products include: Ipsilon-Project Ipsilon.