CVE-2024-32651:
changedetection.io has a Server Side Template Injection using Jinja2 which allows Remote Command Execution
10
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99724%
CWE
Published
10/15/2024
Updated
10/15/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
changedetection.io | pip | <= 0.45.20 | 0.45.21 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two chained Jinja2 operations: 1) from_string() parses attacker-controlled input into executable templates, and 2) render() executes them with access to Python's builtins via the template context. Together they enable RCE through the template engine's introspection capabilities (globals, builtins etc). The PoC demonstrates direct OS command execution via these functions, and security references confirm this pattern constitutes unsafe Jinja2 usage.