Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency jinja2 to v3 [SECURITY] #4

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate-demo
Copy link
Owner

@renovate-demo renovate-demo commented Feb 4, 2024

This PR contains the following updates:

Package Type Update Change
jinja2 (changelog) project.dependencies major ==2.11.1 -> ==3.1.3

Regular Expression Denial of Service (ReDoS) in Jinja2

CVE-2020-28493 / GHSA-g3rq-g295-4j3m / PYSEC-2021-66 / SNYK-PYTHON-JINJA2-1012994

More information

Details

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9.-]+.[a-zA-Z0-9.-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


CVE-2020-28493 / GHSA-g3rq-g295-4j3m / PYSEC-2021-66 / SNYK-PYTHON-JINJA2-1012994

More information

Details

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the _punctuation_re regex operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

Severity

Unknown

References

This data is provided by OSV and the PyPI Advisory Database (CC-BY 4.0).


Jinja vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter

CVE-2024-22195 / GHSA-h5c8-rqwp-cp95

More information

Details

The xmlattr filter in affected versions of Jinja accepts keys containing spaces. XML/HTML attributes cannot contain spaces, as each would then be interpreted as a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. Note that accepting keys as user input is not common or a particularly intended use case of the xmlattr filter, and an application doing so should already be verifying what keys are provided regardless of this fix.

Severity

  • CVSS Score: 5.4 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@renovate-demo renovate-demo changed the title Update dependency jinja2 to v2.11.3 [SECURITY] Update dependency jinja2 to v3 [SECURITY] Mar 3, 2024
@renovate-demo renovate-demo force-pushed the renovate/pypi-jinja2-vulnerability branch from 863591e to ae016d9 Compare March 3, 2024 20:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant