oss-sec mailing list archives
CVE Request: python-jinja2: arbitrary code execution vulnerability
From: Ratul Gupta <ratulg () redhat com>
Date: Fri, 10 Jan 2014 15:27:15 +0530
Hello,Jinja2, a template engine written in pure python, was found to use /tmp as a default directory for jinja2.bccache.FileSystemBytecodeCache, which is insecure because the /tmp directory is world-writable and the filenames used like 'FileSystemBytecodeCache' are often predictable. A malicious user could exploit this bug to execute arbitrary code as another user.
PoC is given on the debian page: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747
References: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747 https://bugzilla.redhat.com/show_bug.cgi?id=1051421 Can a CVE please be assigned to this issue? -- Regards, Ratul Gupta / Red Hat Security Response Team
Current thread:
- CVE Request: python-jinja2: arbitrary code execution vulnerability Ratul Gupta (Jan 10)
- Re: CVE Request: python-jinja2: arbitrary code execution vulnerability cve-assign (Jan 10)