Sync from SUSE:ALP:Source:Standard:1.0 python-Jinja2 revision 97cfd1bafb9b66e361f698a1b7cfe489
This commit is contained in:
parent
0d2f1aeffa
commit
9510b2858d
64
CVE-2024-56201.patch
Normal file
64
CVE-2024-56201.patch
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
From 56a724644b1ad9cb03745c10cca732715cdc79e9 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Sigurd Spieckermann <sigurd.spieckermann@gmail.com>
|
||||||
|
Date: Fri, 26 May 2023 14:32:36 +0200
|
||||||
|
Subject: [PATCH] fix f-string syntax error in code generation
|
||||||
|
|
||||||
|
---
|
||||||
|
src/jinja2/compiler.py | 7 ++++++-
|
||||||
|
tests/test_compile.py | 19 +++++++++++++++++++
|
||||||
|
2 files changed, 25 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
|
Index: Jinja2-3.1.2/src/jinja2/compiler.py
|
||||||
|
===================================================================
|
||||||
|
--- Jinja2-3.1.2.orig/src/jinja2/compiler.py
|
||||||
|
+++ Jinja2-3.1.2/src/jinja2/compiler.py
|
||||||
|
@@ -1122,9 +1122,14 @@ class CodeGenerator(NodeVisitor):
|
||||||
|
)
|
||||||
|
self.writeline(f"if {frame.symbols.ref(alias)} is missing:")
|
||||||
|
self.indent()
|
||||||
|
+ # The position will contain the template name, and will be formatted
|
||||||
|
+ # into a string that will be compiled into an f-string. Curly braces
|
||||||
|
+ # in the name must be replaced with escapes so that they will not be
|
||||||
|
+ # executed as part of the f-string.
|
||||||
|
+ position = self.position(node).replace("{", "{{").replace("}", "}}")
|
||||||
|
message = (
|
||||||
|
"the template {included_template.__name__!r}"
|
||||||
|
- f" (imported on {self.position(node)})"
|
||||||
|
+ f" (imported on {position})"
|
||||||
|
f" does not export the requested name {name!r}"
|
||||||
|
)
|
||||||
|
self.writeline(
|
||||||
|
Index: Jinja2-3.1.2/tests/test_compile.py
|
||||||
|
===================================================================
|
||||||
|
--- Jinja2-3.1.2.orig/tests/test_compile.py
|
||||||
|
+++ Jinja2-3.1.2/tests/test_compile.py
|
||||||
|
@@ -1,6 +1,9 @@
|
||||||
|
import os
|
||||||
|
import re
|
||||||
|
|
||||||
|
+import pytest
|
||||||
|
+
|
||||||
|
+from jinja2 import UndefinedError
|
||||||
|
from jinja2.environment import Environment
|
||||||
|
from jinja2.loaders import DictLoader
|
||||||
|
|
||||||
|
@@ -26,3 +29,19 @@ def test_import_as_with_context_determin
|
||||||
|
expect = [f"'bar{i}': " for i in range(10)]
|
||||||
|
found = re.findall(r"'bar\d': ", content)[:10]
|
||||||
|
assert found == expect
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+def test_undefined_import_curly_name():
|
||||||
|
+ env = Environment(
|
||||||
|
+ loader=DictLoader(
|
||||||
|
+ {
|
||||||
|
+ "{bad}": "{% from 'macro' import m %}{{ m() }}",
|
||||||
|
+ "macro": "",
|
||||||
|
+ }
|
||||||
|
+ )
|
||||||
|
+ )
|
||||||
|
+
|
||||||
|
+ # Must not raise `NameError: 'bad' is not defined`, as that would indicate
|
||||||
|
+ # that `{bad}` is being interpreted as an f-string. It must be escaped.
|
||||||
|
+ with pytest.raises(UndefinedError):
|
||||||
|
+ env.get_template("{bad}").render()
|
169
CVE-2024-56326.patch
Normal file
169
CVE-2024-56326.patch
Normal file
@ -0,0 +1,169 @@
|
|||||||
|
From 91a972f5808973cd441f4dc06873b2f8378f30c7 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Lydxn <hlyndon20@gmail.com>
|
||||||
|
Date: Mon, 23 Sep 2024 15:09:10 -0700
|
||||||
|
Subject: [PATCH] sandbox indirect calls to str.format
|
||||||
|
|
||||||
|
---
|
||||||
|
src/jinja2/sandbox.py | 81 ++++++++++++++++++++++--------------------
|
||||||
|
tests/test_security.py | 17 +++++++++
|
||||||
|
2 files changed, 60 insertions(+), 38 deletions(-)
|
||||||
|
|
||||||
|
Index: Jinja2-3.1.2/src/jinja2/sandbox.py
|
||||||
|
===================================================================
|
||||||
|
--- Jinja2-3.1.2.orig/src/jinja2/sandbox.py
|
||||||
|
+++ Jinja2-3.1.2/src/jinja2/sandbox.py
|
||||||
|
@@ -7,6 +7,7 @@ import typing as t
|
||||||
|
from _string import formatter_field_name_split # type: ignore
|
||||||
|
from collections import abc
|
||||||
|
from collections import deque
|
||||||
|
+from functools import update_wrapper
|
||||||
|
from string import Formatter
|
||||||
|
|
||||||
|
from markupsafe import EscapeFormatter
|
||||||
|
@@ -80,20 +81,6 @@ _mutable_spec: t.Tuple[t.Tuple[t.Type, t
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
-def inspect_format_method(callable: t.Callable) -> t.Optional[str]:
|
||||||
|
- if not isinstance(
|
||||||
|
- callable, (types.MethodType, types.BuiltinMethodType)
|
||||||
|
- ) or callable.__name__ not in ("format", "format_map"):
|
||||||
|
- return None
|
||||||
|
-
|
||||||
|
- obj = callable.__self__
|
||||||
|
-
|
||||||
|
- if isinstance(obj, str):
|
||||||
|
- return obj
|
||||||
|
-
|
||||||
|
- return None
|
||||||
|
-
|
||||||
|
-
|
||||||
|
def safe_range(*args: int) -> range:
|
||||||
|
"""A range that can't generate ranges with a length of more than
|
||||||
|
MAX_RANGE items.
|
||||||
|
@@ -313,6 +300,9 @@ class SandboxedEnvironment(Environment):
|
||||||
|
except AttributeError:
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
+ fmt = self.wrap_str_format(value)
|
||||||
|
+ if fmt is not None:
|
||||||
|
+ return fmt
|
||||||
|
if self.is_safe_attribute(obj, argument, value):
|
||||||
|
return value
|
||||||
|
return self.unsafe_undefined(obj, argument)
|
||||||
|
@@ -330,6 +320,9 @@ class SandboxedEnvironment(Environment):
|
||||||
|
except (TypeError, LookupError):
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
+ fmt = self.wrap_str_format(value)
|
||||||
|
+ if fmt is not None:
|
||||||
|
+ return fmt
|
||||||
|
if self.is_safe_attribute(obj, attribute, value):
|
||||||
|
return value
|
||||||
|
return self.unsafe_undefined(obj, attribute)
|
||||||
|
@@ -345,34 +338,49 @@ class SandboxedEnvironment(Environment):
|
||||||
|
exc=SecurityError,
|
||||||
|
)
|
||||||
|
|
||||||
|
- def format_string(
|
||||||
|
- self,
|
||||||
|
- s: str,
|
||||||
|
- args: t.Tuple[t.Any, ...],
|
||||||
|
- kwargs: t.Dict[str, t.Any],
|
||||||
|
- format_func: t.Optional[t.Callable] = None,
|
||||||
|
- ) -> str:
|
||||||
|
- """If a format call is detected, then this is routed through this
|
||||||
|
- method so that our safety sandbox can be used for it.
|
||||||
|
+ def wrap_str_format(self, value: t.Any) -> t.Optional[t.Callable[..., str]]:
|
||||||
|
+ """If the given value is a ``str.format`` or ``str.format_map`` method,
|
||||||
|
+ return a new function than handles sandboxing. This is done at access
|
||||||
|
+ rather than in :meth:`call`, so that calls made without ``call`` are
|
||||||
|
+ also sandboxed.
|
||||||
|
"""
|
||||||
|
+ if not isinstance(
|
||||||
|
+ value, (types.MethodType, types.BuiltinMethodType)
|
||||||
|
+ ) or value.__name__ not in ("format", "format_map"):
|
||||||
|
+ return None
|
||||||
|
+
|
||||||
|
+ f_self: t.Any = value.__self__
|
||||||
|
+
|
||||||
|
+ if not isinstance(f_self, str):
|
||||||
|
+ return None
|
||||||
|
+
|
||||||
|
+ str_type: t.Type[str] = type(f_self)
|
||||||
|
+ is_format_map = value.__name__ == "format_map"
|
||||||
|
formatter: SandboxedFormatter
|
||||||
|
- if isinstance(s, Markup):
|
||||||
|
- formatter = SandboxedEscapeFormatter(self, escape=s.escape)
|
||||||
|
+
|
||||||
|
+ if isinstance(f_self, Markup):
|
||||||
|
+ formatter = SandboxedEscapeFormatter(self, escape=f_self.escape)
|
||||||
|
else:
|
||||||
|
formatter = SandboxedFormatter(self)
|
||||||
|
|
||||||
|
- if format_func is not None and format_func.__name__ == "format_map":
|
||||||
|
- if len(args) != 1 or kwargs:
|
||||||
|
- raise TypeError(
|
||||||
|
- "format_map() takes exactly one argument"
|
||||||
|
- f" {len(args) + (kwargs is not None)} given"
|
||||||
|
- )
|
||||||
|
+ vformat = formatter.vformat
|
||||||
|
+
|
||||||
|
+ def wrapper(*args: t.Any, **kwargs: t.Any) -> str:
|
||||||
|
+ if is_format_map:
|
||||||
|
+ if kwargs:
|
||||||
|
+ raise TypeError("format_map() takes no keyword arguments")
|
||||||
|
+
|
||||||
|
+ if len(args) != 1:
|
||||||
|
+ raise TypeError(
|
||||||
|
+ f"format_map() takes exactly one argument ({len(args)} given)"
|
||||||
|
+ )
|
||||||
|
+
|
||||||
|
+ kwargs = args[0]
|
||||||
|
+ args = ()
|
||||||
|
|
||||||
|
- kwargs = args[0]
|
||||||
|
- args = ()
|
||||||
|
+ return str_type(vformat(f_self, args, kwargs))
|
||||||
|
|
||||||
|
- rv = formatter.vformat(s, args, kwargs)
|
||||||
|
- return type(s)(rv)
|
||||||
|
+ return update_wrapper(wrapper, value)
|
||||||
|
|
||||||
|
def call(
|
||||||
|
__self, # noqa: B902
|
||||||
|
@@ -382,9 +390,6 @@ class SandboxedEnvironment(Environment):
|
||||||
|
**kwargs: t.Any,
|
||||||
|
) -> t.Any:
|
||||||
|
"""Call an object from sandboxed code."""
|
||||||
|
- fmt = inspect_format_method(__obj)
|
||||||
|
- if fmt is not None:
|
||||||
|
- return __self.format_string(fmt, args, kwargs, __obj)
|
||||||
|
|
||||||
|
# the double prefixes are to avoid double keyword argument
|
||||||
|
# errors when proxying the call.
|
||||||
|
Index: Jinja2-3.1.2/tests/test_security.py
|
||||||
|
===================================================================
|
||||||
|
--- Jinja2-3.1.2.orig/tests/test_security.py
|
||||||
|
+++ Jinja2-3.1.2/tests/test_security.py
|
||||||
|
@@ -171,3 +171,20 @@ class TestStringFormatMap:
|
||||||
|
'{{ ("a{x.foo}b{y}"|safe).format_map({"x":{"foo": 42}, "y":"<foo>"}) }}'
|
||||||
|
)
|
||||||
|
assert t.render() == "a42b<foo>"
|
||||||
|
+
|
||||||
|
+ def test_indirect_call(self):
|
||||||
|
+ def run(value, arg):
|
||||||
|
+ return value.run(arg)
|
||||||
|
+
|
||||||
|
+ env = SandboxedEnvironment()
|
||||||
|
+ env.filters["run"] = run
|
||||||
|
+ t = env.from_string(
|
||||||
|
+ """{% set
|
||||||
|
+ ns = namespace(run="{0.__call__.__builtins__[__import__]}".format)
|
||||||
|
+ %}
|
||||||
|
+ {{ ns | run(not_here) }}
|
||||||
|
+ """
|
||||||
|
+ )
|
||||||
|
+
|
||||||
|
+ with pytest.raises(SecurityError):
|
||||||
|
+ t.render()
|
@ -1,3 +1,9 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Dec 27 14:10:36 UTC 2024 - Nico Krapp <nico.krapp@suse.com>
|
||||||
|
|
||||||
|
- Add security patch CVE-2024-56201.patch (bsc#1234808)
|
||||||
|
- Add security patch CVE-2024-56326.patch (bsc#1234809)
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Mon Jun 3 07:16:34 UTC 2024 - Daniel Garcia <daniel.garcia@suse.com>
|
Mon Jun 3 07:16:34 UTC 2024 - Daniel Garcia <daniel.garcia@suse.com>
|
||||||
|
|
||||||
|
@ -32,6 +32,10 @@ URL: https://jinja.palletsprojects.com
|
|||||||
Source: https://files.pythonhosted.org/packages/source/J/Jinja2/Jinja2-%{version}.tar.gz
|
Source: https://files.pythonhosted.org/packages/source/J/Jinja2/Jinja2-%{version}.tar.gz
|
||||||
# PATCH-FIX-UPSTREAM CVE-2024-34064.patch gh#pallets/jinja@0668239dc6b4
|
# PATCH-FIX-UPSTREAM CVE-2024-34064.patch gh#pallets/jinja@0668239dc6b4
|
||||||
Patch0: CVE-2024-34064.patch
|
Patch0: CVE-2024-34064.patch
|
||||||
|
# PATCH-FIX-UPSTREAM CVE-2024-56201.patch
|
||||||
|
Patch1: CVE-2024-56201.patch
|
||||||
|
# PATCH-FIX-UPSTREAM CVE-2024-56326.patch
|
||||||
|
Patch2: CVE-2024-56326.patch
|
||||||
BuildRequires: %{python_module MarkupSafe >= 0.23}
|
BuildRequires: %{python_module MarkupSafe >= 0.23}
|
||||||
BuildRequires: %{python_module base >= 3.7}
|
BuildRequires: %{python_module base >= 3.7}
|
||||||
BuildRequires: %{python_module pytest}
|
BuildRequires: %{python_module pytest}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user