The default configuration of the Jinja templating engine used in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not enable auto-escaping, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via template variables. NOTE: This may be a duplicate of CVE-2015-5216. Moreover, the Jinja development team does not enable auto-escape by default for performance issues as explained in https://jinja.palletsprojects.com/en/master/faq/#why-is-autoescaping-not-the-default.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://pagure.io/ipsilon/a503aa9c2a30a74e709d1c88099befd50fb2eb16 | patch |
https://fedorahosted.org/ipsilon/wiki/Releases/v1.0.1 | product |
http://www.openwall.com/lists/oss-security/2015/10/23/10 | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=1255168 | third party advisory issue tracking |