Vulnerability Details : CVE-2021-44657
In StackStorm versions prior to 3.6.0, the jinja interpreter was not run in sandbox mode and thus allows execution of unsafe system commands. Jinja does not enable sandboxed mode by default due to backwards compatibility. Stackstorm now sets sandboxed mode for jinja by default.
Products affected by CVE-2021-44657
- cpe:2.3:a:stackstorm:stackstorm:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-44657
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-44657
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2021-44657
-
https://github.com/StackStorm/st2/pull/5359
Use Jinja sandboxed environment by amanda11 · Pull Request #5359 · StackStorm/st2 · GitHubPatch;Third Party Advisory
-
https://github.com/pallets/jinja/issues/549
Execute arbitrary codes in template without sandbox environment. · Issue #549 · pallets/jinja · GitHubExploit;Issue Tracking;Third Party Advisory
-
https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/
Python vulnerabilities : Code execution in jinja templates · PodaliriusExploit;Third Party Advisory
-
https://stackstorm.com/2021/12/16/stackstorm-v3-6-0-released/
StackStorm v3.6.0 Released - StackStormRelease Notes;Vendor Advisory
Jump to