Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Jinja2 代码注入漏洞
Vulnerability Description
Jinja2是一款基于Python的模板引擎。该产品具有完整的Unicode支持,并提供了可选的沙箱模板执行环境。 Jinja2 2.10版本中的‘from_string’函数存在代码注入漏洞。该漏洞源于外部输入数据构造代码段的过程中,网络系统或产品未正确过滤其中的特殊元素。攻击者可利用该漏洞生成非法的代码段,修改网络系统或组件的预期的执行控制流。
CVSS Information
N/A
Vulnerability Type
N/A