Miggo Logo

CVE-2024-32651:
changedetection.io has a Server Side Template Injection using Jinja2 which allows Remote Command Execution

10

CVSS Score
3.1

Basic Information

EPSS Score
0.99724%
Published
10/15/2024
Updated
10/15/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
changedetection.iopip<= 0.45.200.45.21

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two chained Jinja2 operations: 1) from_string() parses attacker-controlled input into executable templates, and 2) render() executes them with access to Python's builtins via the template context. Together they enable RCE through the template engine's introspection capabilities (globals, builtins etc). The PoC demonstrates direct OS command execution via these functions, and security references confirm this pattern constitutes unsafe Jinja2 usage.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry * S*rv*r Si** T*mpl*t* Inj**tion in ***n****t**tion.io **us** *y us*** o* uns*** *un*tions o* Jinj** *llows R*mot* *omm*n* *x**ution on t** s*rv*r *ost. ### **t*ils ***n****t**tion.io v*rsion: *.**.** ``` *o*k*r im***s R*POSITORY

Reasoning

T** vuln*r**ility st*ms *rom two ***in** Jinj** op*r*tions: *) *rom_strin*() p*rs*s *tt**k*r-*ontroll** input into *x**ut**l* t*mpl*t*s, *n* *) r*n**r() *x**ut*s t**m wit* ****ss to Pyt*on's *uiltins vi* t** t*mpl*t* *ont*xt. To**t**r t**y *n**l* R**