mirror of
https://github.com/release-engineering/repo-autoindex.git
synced 2025-02-23 05:32:56 +00:00
16 lines
623 B
YAML
16 lines
623 B
YAML
![]() |
security:
|
||
|
ignore-cvss-severity-below: 4
|
||
|
ignore-vulnerabilities:
|
||
|
70612:
|
||
|
# CVE-2019-8341, jinja2:
|
||
|
#
|
||
|
# In summary, the CVE says that it is unsafe to use untrusted
|
||
|
# user input as Jinja template sources as arbitrary code execution
|
||
|
# is possible. This should be obvious, so unsurprisingly Jinja
|
||
|
# maintainers and various third-parties reject/dispute the CVE,
|
||
|
# including Red Hat in https://bugzilla.redhat.com/show_bug.cgi?id=1677653
|
||
|
#
|
||
|
reason: >-
|
||
|
Not exploitable: user input is not used in any Jinja template sources
|
||
|
continue-on-vulnerability-error: False
|