You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@airflow.apache.org by GitBox <gi...@apache.org> on 2019/04/10 14:43:56 UTC

[GitHub] [airflow] ashb commented on issue #5075: [AIRFLOW-XXX] Change allowed version of Jinja2 to fix CVE-2019-10906

ashb commented on issue #5075: [AIRFLOW-XXX] Change allowed version of Jinja2 to fix CVE-2019-10906
URL: https://github.com/apache/airflow/pull/5075#issuecomment-481720698
 
 
   > In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
   
   We should update, but this doesn't pose any risk to us as we don't use the sandbox. From the [blog post](https://palletsprojects.com/blog/jinja-2-10-1-released/):
   
   > The sandbox is used to restrict what code can be evaluated when rendering untrusted, user-provided templates

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
users@infra.apache.org


With regards,
Apache Git Services