From 8e91e1cd350747698afc139aec1a84cfb992fb77 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Aur=C3=A9lien=20Bompard?= Date: Mon, 24 Jun 2024 10:44:15 +0200 Subject: [PATCH] Ignore vuln 70612 in Safety MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Vulnerability ID: 70612 CVE: CVE-2019-8341 ADVISORY: In Jinja2, the from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing. For more information about this vulnerability, visit https://data.safetycli.com/v/70612/97c Signed-off-by: Aurélien Bompard --- .pre-commit-config.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/.pre-commit-config.yaml b/.pre-commit-config.yaml index e4029cf..cd47fb0 100644 --- a/.pre-commit-config.yaml +++ b/.pre-commit-config.yaml @@ -37,3 +37,5 @@ repos: - id: python-safety-dependencies-check alias: safety additional_dependencies: ["poetry"] + args: ["--ignore=70612"] + # 70612: CVE-2019-8341