Metrics
Affected Vendors & Products
Mon, 22 Sep 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Palletsprojects
Palletsprojects jinja |
|
| CPEs | cpe:2.3:a:palletsprojects:jinja:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Palletsprojects
Palletsprojects jinja |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 07 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:satellite:6.17::el9 cpe:/a:redhat:satellite_capsule:6.17::el9 |
Fri, 28 Mar 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhdh:1.5::el9 |
Fri, 21 Mar 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhdh:1.3::el9 |
Thu, 20 Mar 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.13::el8 |
Wed, 12 Mar 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_aus:8.2 |
Thu, 06 Mar 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat satellite
Redhat satellite Capsule |
|
| CPEs | cpe:/a:redhat:satellite:6.16::el8 cpe:/a:redhat:satellite:6.16::el9 cpe:/a:redhat:satellite_capsule:6.16::el8 cpe:/a:redhat:satellite_capsule:6.16::el9 |
|
| Vendors & Products |
Redhat satellite
Redhat satellite Capsule |
Thu, 27 Feb 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.15::el8 |
Wed, 26 Feb 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openstack
|
|
| CPEs | cpe:/a:redhat:openstack:17.1::el9 | |
| Vendors & Products |
Redhat openstack
|
Fri, 14 Feb 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhdh
|
|
| CPEs | cpe:/a:redhat:openshift:4.12::el8 cpe:/a:redhat:openshift_ironic:4.13::el9 cpe:/a:redhat:rhdh:1.4::el9 |
|
| Vendors & Products |
Redhat rhdh
|
Thu, 13 Feb 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat ansible Automation Platform Redhat discovery Redhat enterprise Linux Redhat openshift Redhat openshift Ironic Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
| CPEs | cpe:/a:redhat:ansible_automation_platform:2.4::el8 cpe:/a:redhat:ansible_automation_platform:2.4::el9 cpe:/a:redhat:ansible_automation_platform:2.5::el8 cpe:/a:redhat:ansible_automation_platform:2.5::el9 cpe:/a:redhat:ansible_automation_platform:ee::el8 cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:openshift:4.16::el9 cpe:/a:redhat:openshift:4.17::el9 cpe:/a:redhat:openshift_ironic:4.12::el9 cpe:/a:redhat:openshift_ironic:4.14::el9 cpe:/a:redhat:openshift_ironic:4.15::el9 cpe:/a:redhat:openshift_ironic:4.16::el9 cpe:/a:redhat:openshift_ironic:4.17::el9 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.4 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 cpe:/o:redhat:discovery:1.0::el9 cpe:/o:redhat:rhel_els:7 |
|
| Vendors & Products |
Redhat
Redhat ansible Automation Platform Redhat discovery Redhat enterprise Linux Redhat openshift Redhat openshift Ironic Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
| Metrics |
threat_severity
|
threat_severity
|
Fri, 27 Dec 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 24 Dec 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 24 Dec 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 23 Dec 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jinja is an extensible templating engine. Prior to 3.1.5, An oversight in how the Jinja sandboxed environment detects calls to str.format allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to store a reference to a malicious string's format method, then pass that to a filter that calls it. No such filters are built-in to Jinja, but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox. This vulnerability is fixed in 3.1.5. | |
| Title | Jinja has a sandbox breakout through indirect reference to format method | |
| Weaknesses | CWE-1336 CWE-693 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-23T15:43:49.400Z
Updated: 2024-12-27T17:54:33.724Z
Reserved: 2024-12-19T18:34:22.764Z
Link: CVE-2024-56326
Updated: 2024-12-24T01:43:04.937Z
Status : Analyzed
Published: 2024-12-23T16:15:07.590
Modified: 2025-09-22T17:41:19.177
Link: CVE-2024-56326