Vulnerabilities > CVE-2021-44657 - Unspecified vulnerability in Stackstorm
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
In StackStorm versions prior to 3.6.0, the jinja interpreter was not run in sandbox mode and thus allows execution of unsafe system commands. Jinja does not enable sandboxed mode by default due to backwards compatibility. Stackstorm now sets sandboxed mode for jinja by default.
Vulnerable Configurations
References
- https://github.com/pallets/jinja/issues/549
- https://github.com/pallets/jinja/issues/549
- https://github.com/StackStorm/st2/pull/5359
- https://github.com/StackStorm/st2/pull/5359
- https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/
- https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/
- https://stackstorm.com/2021/12/16/stackstorm-v3-6-0-released/
- https://stackstorm.com/2021/12/16/stackstorm-v3-6-0-released/