pretix unsafely evaluates variables in emails
Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained two security-relevant bugs: It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {event.init.code.co_filename}}. This way, an attacker with the ability to control email …