MGASA-2024-0199

Source
https://advisories.mageia.org/MGASA-2024-0199.html
Import Source
https://advisories.mageia.org/MGASA-2024-0199.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0199
Related
Published
2024-05-31T15:15:28Z
Modified
2024-05-31T14:56:24Z
Summary
Updated python-jinja2 packages fix security vulnerabilities
Details

It was discovered that Jinja2 incorrectly handled certain HTML attributes that were accepted by the xmlattr filter. An attacker could use this issue to inject arbitrary HTML attribute keys and values to potentially execute a cross-site scripting (XSS) attack.

References
Credits

Affected packages

Mageia:9 / python-jinja2

Package

Name
python-jinja2
Purl
pkg:rpm/mageia/python-jinja2?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.4-1.mga9

Ecosystem specific

{
    "section": "core"
}