Vulnerability Description
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
CVSS Score
8.6
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Palletsprojects | Jinja | < 2.10.1 |
| Fedoraproject | Fedora | 28 |
| Canonical | Ubuntu Linux | 12.04 |
| Redhat | Software Collections | 1.0 |
| Opensuse | Leap | 15.0 |
References
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.htmlMailing ListThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1152Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1237Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1329Third Party Advisory
- https://lists.apache.org/thread.html/09fc842ff444cd43d9d4c510756fec625ef8eb1175f
- https://lists.apache.org/thread.html/2b52b9c8b9d6366a4f1b407a8bde6af28d9fc73fdb3
- https://lists.apache.org/thread.html/320441dccbd9a545320f5f07306d711d4bbd31ba43d
- https://lists.apache.org/thread.html/46c055e173b52d599c648a98199972dbd6a89d2b4c4
- https://lists.apache.org/thread.html/57673a78c4d5c870d3f21465c7e2946b9f8285c7c57
- https://lists.apache.org/thread.html/7f39f01392d320dfb48e4901db68daeece62fd60ef2
- https://lists.apache.org/thread.html/b2380d147b508bbcb90d2cad443c159e63e12555966
- https://lists.apache.org/thread.html/f0c4a03418bcfe70c539c5dbaf99c04c98da13bfa1d
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2019-10906?
CVE-2019-10906 is a vulnerability with a CVSS score of 8.6 (HIGH). In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
How severe is CVE-2019-10906?
CVE-2019-10906 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10906?
Check the references section above for vendor advisories and patch information. Affected products include: Palletsprojects Jinja, Fedoraproject Fedora, Canonical Ubuntu Linux, Redhat Software Collections, Opensuse Leap.