Skip to content

fix(deps): Update dependency Jinja2 to v3.1.6 [SECURITY] #290

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Mar 6, 2025

Conversation

cq-bot
Copy link
Contributor

@cq-bot cq-bot commented Mar 6, 2025

This PR contains the following updates:

Package Update Change
Jinja2 (changelog) patch ==3.1.5 -> ==3.1.6

GitHub Vulnerability Alerts

CVE-2025-27516

An oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code.

To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates.

Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup.


Release Notes

pallets/jinja (Jinja2)

v3.1.6

Compare Source

Released 2025-03-05

  • The |attr filter does not bypass the environment's attribute lookup,
    allowing the sandbox to apply its checks. :ghsa:cpwx-vrp4-4pq7

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@cq-bot cq-bot added automerge Add to automerge PRs once requirements are met security labels Mar 6, 2025
@kodiakhq kodiakhq bot merged commit 995fb93 into main Mar 6, 2025
7 checks passed
@kodiakhq kodiakhq bot deleted the renovate/pypi-jinja2-vulnerability branch March 6, 2025 05:30
kodiakhq bot pushed a commit that referenced this pull request Mar 6, 2025
🤖 I have created a release *beep* *boop*
---


## [0.1.42](v0.1.41...v0.1.42) (2025-03-06)


### Bug Fixes

* **deps:** Update dependency black to v25 ([#287](#287)) ([dca6df3](dca6df3))
* **deps:** Update dependency cloudquery-plugin-pb to v0.0.41 ([#289](#289)) ([17d6e4a](17d6e4a))
* **deps:** Update dependency Jinja2 to v3.1.6 [SECURITY] ([#290](#290)) ([995fb93](995fb93))
* **deps:** Update dependency numpy to v2.2.3 ([#284](#284)) ([d7d344a](d7d344a))
* **deps:** Update dependency pyarrow to v19.0.1 ([#285](#285)) ([29dda77](29dda77))
* **deps:** Update dependency pytz to v2025 ([#288](#288)) ([9134d63](9134d63))

---
This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
automerge Add to automerge PRs once requirements are met security
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant