mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 18:52:12 +00:00
19 lines
839 B
Markdown
19 lines
839 B
Markdown
![]() |
### [CVE-2021-44657](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44657)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
In StackStorm versions prior to 3.6.0, the jinja interpreter was not run in sandbox mode and thus allows execution of unsafe system commands. Jinja does not enable sandboxed mode by default due to backwards compatibility. Stackstorm now sets sandboxed mode for jinja by default.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://github.com/pallets/jinja/issues/549
|
||
|
- https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/
|
||
|
|
||
|
#### Github
|
||
|
No PoCs found on GitHub currently.
|
||
|
|