Vulnerability CVE-2024-22195: Information

Description

Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.

Severity: MEDIUM (6.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Published: Jan. 11, 2024
Modified: Jan. 27, 2024
Error type identifier: CWE-79

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
python3-module-jinja2sisyphus3.1.3-alt13.1.3-alt1ALT-PU-2024-1260-3338371Fixed
python3-module-jinja2sisyphus_e2k3.1.3-alt13.1.3-alt1ALT-PU-2024-2078-1-Fixed
python3-module-jinja2sisyphus_riscv643.1.3-alt13.1.3-alt1ALT-PU-2024-2942-1-Fixed
python3-module-jinja2sisyphus_loongarch643.1.3-alt13.1.3-alt1ALT-PU-2024-1499-1-Fixed
python3-module-jinja2p103.0.1-alt1.p10.13.0.1-alt1.p10.1ALT-PU-2024-3036-5341197Fixed
python3-module-jinja2p10_e2k3.0.1-alt1.p10.13.0.1-alt1.p10.1ALT-PU-2024-4715-1-Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:palletsprojects:jinja:*:*:*:*:*:*:*:*
      End excliding
      3.1.3