• [Security] Update to Jinja2 and related packages
    All checks were successful
    Release / build (push) Successful in 37s
    Release / publish_head (push) Successful in 34s
    Datadog Secrets Scanning / Datadog Static Analyzer (push) Successful in 10s
    Datadog Software Composition Analysis / Datadog SBOM Generation and Upload (push) Successful in 15s
    Datadog Static Analysis / Datadog Static Analyzer (push) Successful in 20s
    Release / publish_head (release) Has been skipped
    Release / build (release) Successful in 36s
    Stable

    dubey released this 2025-03-16 13:13:12 -04:00 | 1 commits to main since this release

    Update Jinja2 to resolve GHSA-cpwx-vrp4-4pq7

    TLDR:

    An oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code.
    
    To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates.
    
    Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup.
    

    Docker images are available at:

    git.dws.rip/dubey/foldsite:1.0.1@sha256:8b71c245f5ad1f8d590b8836617b24af01637aa3df5e85858d1e9bf67373252a
    git.dws.rip/dubey/foldsite:1.0@sha256:8b71c245f5ad1f8d590b8836617b24af01637aa3df5e85858d1e9bf67373252a
    git.dws.rip/dubey/foldsite:sha-744693a5f153e551f9c3629d2fa12b890a268e0d@sha256:8b71c245f5ad1f8d590b8836617b24af01637aa3df5e85858d1e9bf67373252a
    git.dws.rip/dubey/foldsite:latest@sha256:8b71c245f5ad1f8d590b8836617b24af01637aa3df5e85858d1e9bf67373252a
    
    Downloads