-
Notifications
You must be signed in to change notification settings - Fork 62
Commit d67eaf8
authored
deps: update dependency jinja2 to v3.1.4 [security] (#2742)
[](https://renovatebot.com)
This PR contains the following updates:
| Package | Change | Age | Adoption | Passing | Confidence |
|---|---|---|---|---|---|
| [Jinja2](https://togithub.com/pallets/jinja)
([changelog](https://jinja.palletsprojects.com/changes/)) | `==3.1.3` ->
`==3.1.4` |
[](https://docs.renovatebot.com/merge-confidence/)
|
[](https://docs.renovatebot.com/merge-confidence/)
|
[](https://docs.renovatebot.com/merge-confidence/)
|
[](https://docs.renovatebot.com/merge-confidence/)
|
---
> [!WARNING]
> Some dependencies could not be looked up. Check the Dependency
Dashboard for more information.
### GitHub Vulnerability Alerts
####
[CVE-2024-34064](https://togithub.com/pallets/jinja/security/advisories/GHSA-h75v-3vvj-5mfj)
The `xmlattr` filter in affected versions of Jinja accepts keys
containing non-attribute characters. XML/HTML attributes cannot contain
spaces, `/`, `>`, or `=`, as each would then be interpreted as starting
a separate attribute. If an application accepts keys (as opposed to only
values) as user input, and renders these in pages that other users see
as well, an attacker could use this to inject other attributes and
perform XSS. The fix for the previous GHSA-h5c8-rqwp-cp95 CVE-2024-22195
only addressed spaces but not other characters.
Accepting keys as user input is now explicitly considered an unintended
use case of the `xmlattr` filter, and code that does so without
otherwise validating the input should be flagged as insecure, regardless
of Jinja version. Accepting _values_ as user input continues to be safe.
---
### Release Notes
<details>
<summary>pallets/jinja (Jinja2)</summary>
###
[`v3.1.4`](https://togithub.com/pallets/jinja/blob/HEAD/CHANGES.rst#Version-314)
[Compare
Source](https://togithub.com/pallets/jinja/compare/3.1.3...3.1.4)
Released 2024-05-05
- The `xmlattr` filter does not allow keys with `/` solidus, `>`
greater-than sign, or `=` equals sign, in addition to disallowing
spaces.
Regardless of any validation done by Jinja, user input should never be
used
as keys to this filter, or must be separately validated first.
:ghsa:`h75v-3vvj-5mfj`
</details>
---
### Configuration
📅 **Schedule**: Branch creation - "" (UTC), Automerge - At any time (no
schedule defined).
🚦 **Automerge**: Disabled by config. Please merge this manually once you
are satisfied.
♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the
rebase/retry checkbox.
🔕 **Ignore**: Close this PR and you won't be reminded about this update
again.
---
- [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check
this box
---
This PR has been generated by [Mend
Renovate](https://www.mend.io/free-developer-tools/renovate/). View
repository job log
[here](https://developer.mend.io/github/googleapis/sdk-platform-java).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNy4zNDAuMTAiLCJ1cGRhdGVkSW5WZXIiOiIzNy4zNTEuMiIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOltdfQ==-->1 parent 1114f18 commit d67eaf8Copy full SHA for d67eaf8
1 file changed
+1
-1
lines changedlibrary_generation/requirements.txt
Copy file name to clipboardExpand all lines: library_generation/requirements.txt+1-1
Original file line number | Diff line number | Diff line change | |
---|---|---|---|
| |||
5 | 5 |
| |
6 | 6 |
| |
7 | 7 |
| |
8 |
| - | |
| 8 | + | |
9 | 9 |
| |
10 | 10 |
| |
11 | 11 |
| |
|
0 commit comments