fix(deps): update dependency com.hubspot.jinjava:jinjava to v2.7.5 [security] (master) #32
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
For any questions/concerns about this PR, please review the Renovate Bot wiki/FAQs, or the #renovatebot Slack channel.
This PR contains the following updates:
2.7.0->2.7.5Warning
Some dependencies could not be looked up. Check the warning logs for more information.
GitHub Vulnerability Alerts
CVE-2025-59340
Summary
jinjava’s current sandbox restrictions prevent direct access to dangerous methods such as
getClass(), and block instantiation of Class objects. However, these protections can be bypassed.By using mapper.getTypeFactory().constructFromCanonical(), it is possible to instruct the underlying ObjectMapper to deserialize attacker-controlled input into arbitrary classes. This enables the creation of semi-arbitrary class instances without directly invoking restricted methods or class literals.
As a result, an attacker can escape the sandbox and instantiate classes such as java.net.URL, opening up the ability to access local files and URLs(e.g., file:///etc/passwd). With further chaining, this primitive can potentially lead to remote code execution (RCE).
Details
jinjava templates expose a built-in variable
____int3rpr3t3r____, which provides direct access to the jinjavaInterpreter instance.This variable was previously abused and protections were added to prevent call method from
JinjavaInterpreterinstances (see Add interpreter to blacklist).However, interacting with the properties of
JinjavaInterpreterinstances remains unrestricted.From
____int3rpr3t3r____, it is possible to traverse to theconfigfield, which exposes an ObjectMapper. By invokingreadValue(String content, JavaType valueType)on this ObjectMapper, an attacker can instantiate arbitrary classes specified viaJavaType.Although jinjava explicitly restricts dangerous classes such as
Class,ClassLoader, and so on insideJinjavaBeanELResolver, theJavaTypeclass itself is not restricted.As a result, an attacker can leverage
JavaTypeconstruction (constructFromCanonical) to instantiate semi-arbitrary classes without directly calling restricted methods.This allows sandbox escape and the creation of powerful primitives.
Impact
Escape the Jinjava sandbox and instantiate a wide range of classes using JavaType.
This capability can be used to read arbitrary files and to perform full read SSRF by creating network-related objects.
In certain environments, depending on the available classes, this primitive can even lead to complete remote code execution.
jinjava has Sandbox Bypass via JavaType-Based Deserialization
CVE-2025-59340 / GHSA-m49c-g9wr-hv6v
More information
Details
Summary
jinjava’s current sandbox restrictions prevent direct access to dangerous methods such as
getClass(), and block instantiation of Class objects. However, these protections can be bypassed.By using mapper.getTypeFactory().constructFromCanonical(), it is possible to instruct the underlying ObjectMapper to deserialize attacker-controlled input into arbitrary classes. This enables the creation of semi-arbitrary class instances without directly invoking restricted methods or class literals.
As a result, an attacker can escape the sandbox and instantiate classes such as java.net.URL, opening up the ability to access local files and URLs(e.g., file:///etc/passwd). With further chaining, this primitive can potentially lead to remote code execution (RCE).
Details
jinjava templates expose a built-in variable
____int3rpr3t3r____, which provides direct access to the jinjavaInterpreter instance.This variable was previously abused and protections were added to prevent call method from
JinjavaInterpreterinstances (see Add interpreter to blacklist).However, interacting with the properties of
JinjavaInterpreterinstances remains unrestricted.From
____int3rpr3t3r____, it is possible to traverse to theconfigfield, which exposes an ObjectMapper. By invokingreadValue(String content, JavaType valueType)on this ObjectMapper, an attacker can instantiate arbitrary classes specified viaJavaType.Although jinjava explicitly restricts dangerous classes such as
Class,ClassLoader, and so on insideJinjavaBeanELResolver, theJavaTypeclass itself is not restricted.As a result, an attacker can leverage
JavaTypeconstruction (constructFromCanonical) to instantiate semi-arbitrary classes without directly calling restricted methods.This allows sandbox escape and the creation of powerful primitives.
Impact
Escape the Jinjava sandbox and instantiate a wide range of classes using JavaType.
This capability can be used to read arbitrary files and to perform full read SSRF by creating network-related objects.
In certain environments, depending on the available classes, this primitive can even lead to complete remote code execution.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.