#VU85880 Security features bypass in templated-dictionary


Vulnerability identifier: #VU85880

Vulnerability risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-6395

CWE-ID: CWE-254

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
templated-dictionary
Universal components / Libraries / Programming Languages & Components

Vendor: Miroslav Suchý

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to absence of proper sandboxing during the expansion and execution of Jinja2 templates. While the Mock documentation advises treating users added to the mock group as privileged, certain build systems invoking mock on behalf of users might inadvertently permit less privileged users to define configuration tags. These tags could then be passed as parameters to mock during execution, potentially leading to the utilization of Jinja2 templates for remote privilege escalation and the execution of arbitrary code as the root user on the build server.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

templated-dictionary: 1.0-1 - 1.2-1


External links
http://access.redhat.com/security/cve/CVE-2023-6395
http://bugzilla.redhat.com/show_bug.cgi?id=2252206
http://github.com/xsuchy/templated-dictionary/commit/0740bd0ca8d487301881541028977d120f8b8933
http://github.com/xsuchy/templated-dictionary/commit/bcd90f0dafa365575c4b101e6f5d98c4ef4e4b69
http://www.openwall.com/lists/oss-security/2024/01/16/1
http://www.openwall.com/lists/oss-security/2024/01/16/3


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability