Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-22195
HistoryJan 11, 2024 - 12:00 a.m.

CVE-2024-22195

2024-01-1100:00:00
ubuntu.com
ubuntu.com
23
jinja
templating
xss
vulnerability
cve-2024-22195
html
attributes
python
syntax
injection
bypassing
auto escaping
mechanism
validation
checks

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.3%

Jinja is an extensible templating engine. Special placeholders in the
template allow writing code similar to Python syntax. It is possible to
inject arbitrary HTML attributes into the rendered HTML template,
potentially leading to Cross-Site Scripting (XSS). The Jinja xmlattr
filter can be abused to inject arbitrary HTML attribute keys and values,
bypassing the auto escaping mechanism and potentially leading to XSS. It
may also be possible to bypass attribute validation checks if they are
blacklist-based.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchjinja2< 2.10-1ubuntu0.18.04.1+esm1UNKNOWN
ubuntu20.04noarchjinja2< 2.10.1-2ubuntu0.2UNKNOWN
ubuntu22.04noarchjinja2< 3.0.3-1ubuntu0.1UNKNOWN
ubuntu23.10noarchjinja2< 3.1.2-1ubuntu0.23.10.1UNKNOWN
ubuntu24.04noarchjinja2< 3.1.2-1ubuntu1UNKNOWN
ubuntu14.04noarchjinja2< 2.7.2-2ubuntu0.1~esm2UNKNOWN
ubuntu16.04noarchjinja2< 2.8-1ubuntu0.1+esm2UNKNOWN

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.3%