CVE-2020-28493 log

Source
Severity Low
Remote Yes
Type Denial of service
Description
A security issue was found in python-jinja before version 2.11.3. The regular expression denial of service vulnerability is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
Group Package Affected Fixed Severity Status Ticket
AVG-1523 python-jinja, python2-jinja 2.11.2-4 2.11.3-1 Low Fixed
Date Advisory Group Package Severity Type
07 Feb 2021 ASA-202102-20 AVG-1523 python2-jinja Low denial of service
07 Feb 2021 ASA-202102-19 AVG-1523 python-jinja Low denial of service
References
https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994
https://github.com/pallets/jinja/pull/1343
https://github.com/pallets/jinja/commit/ef658dc3b6389b091d608e710a810ce8b87995b3
Notes
Workaround
==========

This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.