CVE编号
CVE-2019-10906利用情况
暂无补丁情况
官方补丁披露时间
2019-04-07漏洞描述
Pallets Jinja是一款使用Python语言编写的模板引擎。 Pallets Jinja 2.10.1之前版本中存在权限许可和访问控制问题漏洞。攻击者可利用该漏洞绕过沙盒保护。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html | |
https://access.redhat.com/errata/RHSA-2019:1152 | |
https://access.redhat.com/errata/RHSA-2019:1237 | |
https://access.redhat.com/errata/RHSA-2019:1329 | |
https://lists.apache.org/thread.html/09fc842ff444cd43d9d4c510756fec625ef8eb11... | |
https://lists.apache.org/thread.html/2b52b9c8b9d6366a4f1b407a8bde6af28d9fc73f... | |
https://lists.apache.org/thread.html/320441dccbd9a545320f5f07306d711d4bbd31ba... | |
https://lists.apache.org/thread.html/46c055e173b52d599c648a98199972dbd6a89d2b... | |
https://lists.apache.org/thread.html/57673a78c4d5c870d3f21465c7e2946b9f8285c7... | |
https://lists.apache.org/thread.html/7f39f01392d320dfb48e4901db68daeece62fd60... | |
https://lists.apache.org/thread.html/b2380d147b508bbcb90d2cad443c159e63e12555... | |
https://lists.apache.org/thread.html/f0c4a03418bcfe70c539c5dbaf99c04c98da13bf... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://palletsprojects.com/blog/jinja-2-10-1-released | |
https://usn.ubuntu.com/4011-1/ | |
https://usn.ubuntu.com/4011-2/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | palletsprojects | jinja | * |
Up to (excluding) 2.10.1 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | jinja2 | * |
Up to (excluding) 2.10.1-2.el8_0 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | jinja2 | * |
Up to (excluding) 2.8-1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | jinja2 | * |
Up to (excluding) 2.10.1-1.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_29 | jinja2 | * |
Up to (excluding) 2.10.1-1.fc29 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_30 | jinja2 | * |
Up to (excluding) 2.10.1-1.fc30 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_6 | jinja2 | * |
Up to (excluding) 2.8.1-2.el6 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | jinja2 | * |
Up to (excluding) 2.8.1-2.el7 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | jinja2 | * |
Up to (excluding) 2.10.1-lp150.2.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | jinja2 | * |
Up to (excluding) 2.8-10.4.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | jinja2 | * |
Up to (excluding) 2.10.1-2.el8_0 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | jinja2 | * |
Up to (excluding) 2.10.1-2.el8_0 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04 | jinja2 | * |
Up to (excluding) 2.7.2-2ubuntu0.1~esm1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | jinja2 | * |
Up to (excluding) 2.8-1ubuntu0.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | jinja2 | * |
Up to (excluding) 2.10-1ubuntu0.18.04.1 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 越权影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...