Feb. 21, 2023, 9:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions earlier than 1.5.7 are impacted by a remote code execution vulnerability. Nautobot did not properly sandbox Jinja2 template rendering. In Nautobot 1.5.7 has enabled sandboxed environments for the Jinja2 template engine used internally for template rendering for the following objects: `extras.ComputedField`, `extras.CustomLink`, `extras.ExportTemplate`, `extras.Secret`, `extras.Webhook`. While no active exploits of this vulnerability are known this change has been made as a preventative measure to …

automation change code code execution cve engine environments exploits network platform remote code remote code execution sandbox secret template truth vulnerability webhook

Cyber Security Analyst

@ Dane Street | Palm Beach Gardens, Florida, United States

Program Information System Security Manager (ISSM) - onsite Tucson, AZ - TOP SECRET required

@ RTX | AZ855: RMS AP Bldg M05 1151 East Hermans Road Building M05, Tucson, AZ, 85756 USA

Lead - Business System Service (Workday HR Functional Consultant)

@ Freshworks | Bengaluru, India

Cloud Security Engineer

@ ButterflyMX | United States - Remote

Compliance Specialist

@ Airtable | Austin, Texas or San Francisco, California

Cyber SCRM Cloud Assessor Lead

@ Accenture Federal Services | Arlington, VA