Vulnerability Description
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
CVSS Score
8.6
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Palletsprojects | Jinja | < 2.8.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html
- https://access.redhat.com/errata/RHSA-2019:1022
- https://access.redhat.com/errata/RHSA-2019:1237
- https://access.redhat.com/errata/RHSA-2019:1260
- https://access.redhat.com/errata/RHSA-2019:3964
- https://access.redhat.com/errata/RHSA-2019:4062
- https://github.com/pallets/jinja/commit/9b53045c34e61013dc8f09b7e52a555fa16bed16PatchThird Party Advisory
- https://palletsprojects.com/blog/jinja-281-released/Vendor Advisory
- https://usn.ubuntu.com/4011-1/
- https://usn.ubuntu.com/4011-2/
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html
- https://access.redhat.com/errata/RHSA-2019:1022
- https://access.redhat.com/errata/RHSA-2019:1237
FAQ
What is CVE-2016-10745?
CVE-2016-10745 is a vulnerability with a CVSS score of 8.6 (HIGH). In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
How severe is CVE-2016-10745?
CVE-2016-10745 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10745?
Check the references section above for vendor advisories and patch information. Affected products include: Palletsprojects Jinja.