CVE-2014-1402

The default configuration for bccache.FileSystemBytecodeCache in Jinja2 before 2.7.2 does not properly create temporary files, which allows local users to gain privileges via a crafted .cache file with a name starting with __jinja2_ in /tmp.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0028.html
http://jinja.pocoo.org/docs/changelog/
http://openwall.com/lists/oss-security/2014/01/10/2
http://openwall.com/lists/oss-security/2014/01/10/3
http://rhn.redhat.com/errata/RHSA-2014-0747.html
http://rhn.redhat.com/errata/RHSA-2014-0748.html
http://secunia.com/advisories/56287
http://secunia.com/advisories/58783
http://secunia.com/advisories/58918
http://secunia.com/advisories/59017
http://secunia.com/advisories/60738
http://secunia.com/advisories/60770
http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2014:096
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747
https://bugzilla.redhat.com/show_bug.cgi?id=1051421
https://oss.oracle.com/pipermail/el-errata/2014-June/004192.html
http://advisories.mageia.org/MGASA-2014-0028.html
http://jinja.pocoo.org/docs/changelog/
http://openwall.com/lists/oss-security/2014/01/10/2
http://openwall.com/lists/oss-security/2014/01/10/3
http://rhn.redhat.com/errata/RHSA-2014-0747.html
http://rhn.redhat.com/errata/RHSA-2014-0748.html
http://secunia.com/advisories/56287
http://secunia.com/advisories/58783
http://secunia.com/advisories/58918
http://secunia.com/advisories/59017
http://secunia.com/advisories/60738
http://secunia.com/advisories/60770
http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2014:096
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747
https://bugzilla.redhat.com/show_bug.cgi?id=1051421
https://oss.oracle.com/pipermail/el-errata/2014-June/004192.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pocoo:jinja2:*:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.0:-:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.1:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.2:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.3:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.4:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.5:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.6:*:*:*:*:*:*:*
cpe:2.3:a:pocoo:jinja2:2.7:*:*:*:*:*:*:*

History

21 Nov 2024, 02:04

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0028.html - () http://advisories.mageia.org/MGASA-2014-0028.html -
References () http://jinja.pocoo.org/docs/changelog/ - () http://jinja.pocoo.org/docs/changelog/ -
References () http://openwall.com/lists/oss-security/2014/01/10/2 - () http://openwall.com/lists/oss-security/2014/01/10/2 -
References () http://openwall.com/lists/oss-security/2014/01/10/3 - () http://openwall.com/lists/oss-security/2014/01/10/3 -
References () http://rhn.redhat.com/errata/RHSA-2014-0747.html - () http://rhn.redhat.com/errata/RHSA-2014-0747.html -
References () http://rhn.redhat.com/errata/RHSA-2014-0748.html - () http://rhn.redhat.com/errata/RHSA-2014-0748.html -
References () http://secunia.com/advisories/56287 - () http://secunia.com/advisories/56287 -
References () http://secunia.com/advisories/58783 - () http://secunia.com/advisories/58783 -
References () http://secunia.com/advisories/58918 - () http://secunia.com/advisories/58918 -
References () http://secunia.com/advisories/59017 - () http://secunia.com/advisories/59017 -
References () http://secunia.com/advisories/60738 - () http://secunia.com/advisories/60738 -
References () http://secunia.com/advisories/60770 - () http://secunia.com/advisories/60770 -
References () http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml - () http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:096 - () http://www.mandriva.com/security/advisories?name=MDVSA-2014:096 -
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747 - () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1051421 - () https://bugzilla.redhat.com/show_bug.cgi?id=1051421 -
References () https://oss.oracle.com/pipermail/el-errata/2014-June/004192.html - () https://oss.oracle.com/pipermail/el-errata/2014-June/004192.html -

Information

Published : 2014-05-19 14:55

Updated : 2024-11-21 02:04


NVD link : CVE-2014-1402

Mitre link : CVE-2014-1402

CVE.ORG link : CVE-2014-1402


JSON object : View

Products Affected

pocoo

  • jinja2
CWE
CWE-264

Permissions, Privileges, and Access Controls