Metrics
Affected Vendors & Products
Fri, 14 Feb 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhdh
|
|
CPEs | cpe:/a:redhat:openshift:4.12::el8 cpe:/a:redhat:openshift_ironic:4.13::el9 cpe:/a:redhat:rhdh:1.4::el9 |
|
Vendors & Products |
Redhat rhdh
|
Thu, 13 Feb 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat ansible Automation Platform Redhat discovery Redhat enterprise Linux Redhat openshift Redhat openshift Ironic Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
CPEs | cpe:/a:redhat:ansible_automation_platform:2.4::el8 cpe:/a:redhat:ansible_automation_platform:2.4::el9 cpe:/a:redhat:ansible_automation_platform:2.5::el8 cpe:/a:redhat:ansible_automation_platform:2.5::el9 cpe:/a:redhat:ansible_automation_platform:ee::el8 cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:openshift:4.16::el9 cpe:/a:redhat:openshift:4.17::el9 cpe:/a:redhat:openshift_ironic:4.12::el9 cpe:/a:redhat:openshift_ironic:4.14::el9 cpe:/a:redhat:openshift_ironic:4.15::el9 cpe:/a:redhat:openshift_ironic:4.16::el9 cpe:/a:redhat:openshift_ironic:4.17::el9 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.4 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 cpe:/o:redhat:discovery:1.0::el9 cpe:/o:redhat:rhel_els:7 |
|
Vendors & Products |
Redhat
Redhat ansible Automation Platform Redhat discovery Redhat enterprise Linux Redhat openshift Redhat openshift Ironic Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
Metrics |
threat_severity
|
threat_severity
|
Fri, 27 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 24 Dec 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 24 Dec 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Mon, 23 Dec 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Jinja is an extensible templating engine. Prior to 3.1.5, An oversight in how the Jinja sandboxed environment detects calls to str.format allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to store a reference to a malicious string's format method, then pass that to a filter that calls it. No such filters are built-in to Jinja, but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox. This vulnerability is fixed in 3.1.5. | |
Title | Jinja has a sandbox breakout through indirect reference to format method | |
Weaknesses | CWE-1336 CWE-693 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-27T17:54:33.724Z
Reserved: 2024-12-19T18:34:22.764Z
Link: CVE-2024-56326

Updated: 2024-12-24T01:43:04.937Z

Status : Awaiting Analysis
Published: 2024-12-23T16:15:07.590
Modified: 2024-12-27T18:15:38.947
Link: CVE-2024-56326
