It was discovered that Jinja2 incorrectly handled certain HTML attributes that were accepted by the xmlattr filter. An attacker could use this issue to inject arbitrary HTML attribute keys and values to potentially execute a cross-site scripting (XSS) attack.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.7.2-2ubuntu0.1~esm3", "binary_name": "python-jinja2" }, { "binary_version": "2.7.2-2ubuntu0.1~esm3", "binary_name": "python-jinja2-doc" }, { "binary_version": "2.7.2-2ubuntu0.1~esm3", "binary_name": "python3-jinja2" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.8-1ubuntu0.1+esm3", "binary_name": "python-jinja2" }, { "binary_version": "2.8-1ubuntu0.1+esm3", "binary_name": "python-jinja2-doc" }, { "binary_version": "2.8-1ubuntu0.1+esm3", "binary_name": "python3-jinja2" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.10-1ubuntu0.18.04.1+esm2", "binary_name": "python-jinja2" }, { "binary_version": "2.10-1ubuntu0.18.04.1+esm2", "binary_name": "python-jinja2-doc" }, { "binary_version": "2.10-1ubuntu0.18.04.1+esm2", "binary_name": "python3-jinja2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.10.1-2ubuntu0.3", "binary_name": "python-jinja2" }, { "binary_version": "2.10.1-2ubuntu0.3", "binary_name": "python-jinja2-doc" }, { "binary_version": "2.10.1-2ubuntu0.3", "binary_name": "python3-jinja2" } ] }