CVE-2016-10745 — Use of Externally-Controlled Format String in Jinja
Severity
8.6HIGHNVD
EPSS
1.0%
top 22.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 8
Latest updateJun 6
Description
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:NExploitability: 3.9 | Impact: 4.0
Affected Packages4 packages
Patches
🔴Vulnerability Details
6📋Vendor Advisories
4💬Community
6Bugzilla▶
CVE-2016-10745 python-jinja2: Sandbox escape due to information disclosure via str.format [fedora-28]↗2019-04-10
Bugzilla▶
CVE-2016-10745 python-jinja2: Sandbox escape due to information disclosure via str.format [fedora-29]↗2019-04-10
Bugzilla▶
CVE-2016-10745 python-jinja2: Sandbox escape due to information disclosure via str.format↗2019-04-10
Bugzilla▶
CVE-2016-10745 python3-jinja2: python-jinja2: Sandbox escape due to information disclosure via str.format [epel-6]↗2019-04-10
Bugzilla▶
CVE-2016-10745 python-jinja2-26: python-jinja2: Sandbox escape due to information disclosure via str.format [epel-6]↗2019-04-10