Files
CVEs-PoC/2016/CVE-2016-10745.md
T
2025-09-29 21:09:30 +02:00

22 lines
731 B
Markdown

### [CVE-2016-10745](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10745)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
### POC
#### Reference
- https://usn.ubuntu.com/4011-1/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/JinBean/CVE-Extension
- https://github.com/LoricAndre/OSV_Commits_Analysis
- https://github.com/arvion-ai/test-vulnerable-python2
- https://github.com/seal-community/patches