Security features bypass in templated-dictionary - CVE-2023-6395

 

Security features bypass in templated-dictionary - CVE-2023-6395

Published: January 29, 2024


Vulnerability identifier: #VU85880
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2023-6395
CWE-ID: CWE-254
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
templated-dictionary
Software vendor:
xsuchy

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to absence of proper sandboxing during the expansion and execution of Jinja2 templates. While the Mock documentation advises treating users added to the mock group as privileged, certain build systems invoking mock on behalf of users might inadvertently permit less privileged users to define configuration tags. These tags could then be passed as parameters to mock during execution, potentially leading to the utilization of Jinja2 templates for remote privilege escalation and the execution of arbitrary code as the root user on the build server.


Remediation

Install updates from vendor's website.

External links