Skip to content

Commit

Permalink
CVE-2024-56334 now fixed in 1.4.1
Browse files Browse the repository at this point in the history
Signed-off-by: Nick Boldt <[email protected]>

add CVE-2024-56334 to snip-fixed-security-issues-in-product-1.4.1.adoc

Signed-off-by: Nick Boldt <[email protected]>
  • Loading branch information
nickboldt committed Jan 15, 2025
1 parent 462e8fb commit b6117b9
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,4 @@ CVE-2024-56201, rhdh/rhdh-hub-rhel9: Jinja has a sandbox breakout through malici
CVE-2024-56326, rhdh/rhdh-hub-rhel9: Jinja has a sandbox breakout through indirect reference to format method
CVE-2024-55565, rhdh-hub-container: nanoid mishandles non-integer values
CVE-2024-52798, rhdh-hub-container: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x

# not yet fixed for 1.4.z
# CVE-2024-56334, rhdh/rhdh-hub-rhel9: Command injection vulnerability in getWindowsIEEE8021x (SSID) function in systeminformation
CVE-2024-56334, rhdh/rhdh-hub-rhel9: Command injection vulnerability in getWindowsIEEE8021x (SSID) function in systeminformation
Original file line number Diff line number Diff line change
Expand Up @@ -14,3 +14,6 @@ A flaw was found in the Jinja2 package. A bug in the Jinja compiler allows an at

link:https://access.redhat.com/security/cve/CVE-2024-56326[CVE-2024-56326]::
A flaw was found in the Jinja package. In affected versions of Jinja, an oversight in how the Jinja sandboxed environment detects calls to str.format allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications that execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, storing a reference to a malicious string's format method is possible, then passing that to a filter that calls it. No such filters are built into Jinja but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox.

link:https://access.redhat.com/security/cve/CVE-2024-56334[CVE-2024-56334]::
A flaw was found in the systeminformation library for Node.js. In Windows systems, the SSID parameter of the `getWindowsIEEE8021x` function is not sanitized before it is passed to cmd.exe. This may allow a remote attacker to execute arbitrary commands on the target system.

0 comments on commit b6117b9

Please sign in to comment.