Date: Tue, 20 Aug 2024 09:33:17 GMT From: Nicola Vitale <nivit@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: cab7616c17ce - main - security/vuxml: Add devel/py-Jinja2 <= 3.1.3 Message-ID: <202408200933.47K9XHYq031833@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by nivit: URL: https://cgit.FreeBSD.org/ports/commit/?id=cab7616c17ce593a96608ccdbb080a2d1a973a41 commit cab7616c17ce593a96608ccdbb080a2d1a973a41 Author: Nicola Vitale <nivit@FreeBSD.org> AuthorDate: 2024-08-20 09:20:48 +0000 Commit: Nicola Vitale <nivit@FreeBSD.org> CommitDate: 2024-08-20 09:20:48 +0000 security/vuxml: Add devel/py-Jinja2 <= 3.1.3 Reference: https://github.com/advisories/GHSA-h75v-3vvj-5mfj PR: 279350 --- security/vuxml/vuln/2024.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 1fa93858ab61..182c9cbc4d5f 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,45 @@ + <vuln vid="04c9c3f8-5ed3-11ef-8262-b0416f0c4c67"> + <topic>Jinja2 -- Vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter</topic> + <affects> + <package> + <name>py38-Jinja2</name> + <name>py39-Jinja2</name> + <name>py310-Jinja2</name> + <name>py311-Jinja2</name> + <range><lt>3.1.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>security-advisories@github.com reports:</p> + <blockquote cite="https://github.com/pallets/jinja/commit/0668239dc6b44ef38e7a6c9f91f312fd4ca581cb"> + <p>Jinja is an extensible templating engine. The `xmlattr` filter in + affected versions of Jinja accepts keys containing non-attribute + characters. XML/HTML attributes cannot contain spaces, `/`, `>`, + or `=`, as each would then be interpreted as starting a separate + attribute. If an application accepts keys (as opposed to only + values) as user input, and renders these in pages that other users + see as well, an attacker could use this to inject other attributes + and perform XSS. The fix for CVE-2024-22195 only addressed spaces + but not other characters. Accepting keys as user input is now + explicitly considered an unintended use case of the `xmlattr` filter, + and code that does so without otherwise validating the input should + be flagged as insecure, regardless of Jinja version. Accepting + _values_ as user input continues to be safe. This vulnerability + is fixed in 3.1.4.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-34064</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2024-34064</url> + </references> + <dates> + <discovery>2024-05-06</discovery> + <entry>2024-08-20</entry> + </dates> + </vuln> + <vuln vid="d0ac9a17-5e68-11ef-b8cc-b42e991fc52e"> <topic>mozilla products -- spoofing attack</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202408200933.47K9XHYq031833>