All the vulnerabilites related to twigphp - Twig
cve-2025-24374
Vulnerability from cvelistv5
Published
2025-01-29 15:22
Modified
2025-01-29 15:44
Severity ?
EPSS score ?
Summary
Twig fixes a security issue where escaping was missing when using null coalesce operator (??)
References
▼ | URL | Tags |
---|---|---|
https://github.com/twigphp/Twig/security/advisories/GHSA-3xg3-cgvq-2xwr | x_refsource_CONFIRM | |
https://github.com/twigphp/Twig/commit/38576b12f05df3cc871bf68f39ccb46b418334a3 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24374", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-29T15:44:45.378845Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-29T15:44:49.358Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Twig", "vendor": "twigphp", "versions": [ { "status": "affected", "version": "\u003e= 3.16.0, \u003c 3.19.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Twig is a template language for PHP. When using the ?? operator, output escaping was missing for the expression on the left side of the operator. This vulnerability is fixed in 3.19.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-29T15:22:34.012Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/twigphp/Twig/security/advisories/GHSA-3xg3-cgvq-2xwr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/twigphp/Twig/security/advisories/GHSA-3xg3-cgvq-2xwr" }, { "name": "https://github.com/twigphp/Twig/commit/38576b12f05df3cc871bf68f39ccb46b418334a3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/twigphp/Twig/commit/38576b12f05df3cc871bf68f39ccb46b418334a3" } ], "source": { "advisory": "GHSA-3xg3-cgvq-2xwr", "discovery": "UNKNOWN" }, "title": "Twig fixes a security issue where escaping was missing when using null coalesce operator (??)" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-24374", "datePublished": "2025-01-29T15:22:34.012Z", "dateReserved": "2025-01-20T15:18:26.992Z", "dateUpdated": "2025-01-29T15:44:49.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51754
Vulnerability from cvelistv5
Published
2024-11-06 19:28
Modified
2024-11-06 19:44
Severity ?
EPSS score ?
Summary
Unguarded calls to __toString() when nesting an object into an array in Twig
References
▼ | URL | Tags |
---|---|---|
https://github.com/twigphp/Twig/security/advisories/GHSA-6377-hfv9-hqf6 | x_refsource_CONFIRM | |
https://github.com/twigphp/Twig/commit/2bb8c2460a2c519c498df9b643d5277117155a73 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51754", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T19:40:22.129936Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T19:44:28.082Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Twig", "vendor": "twigphp", "versions": [ { "status": "affected", "version": "\u003c 3.11.2" }, { "status": "affected", "version": "\u003e= 3.12.0, \u003c 3.14.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-668", "description": "CWE-668: Exposure of Resource to Wrong Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-06T19:28:17.553Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/twigphp/Twig/security/advisories/GHSA-6377-hfv9-hqf6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/twigphp/Twig/security/advisories/GHSA-6377-hfv9-hqf6" }, { "name": "https://github.com/twigphp/Twig/commit/2bb8c2460a2c519c498df9b643d5277117155a73", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/twigphp/Twig/commit/2bb8c2460a2c519c498df9b643d5277117155a73" } ], "source": { "advisory": "GHSA-6377-hfv9-hqf6", "discovery": "UNKNOWN" }, "title": "Unguarded calls to __toString() when nesting an object into an array in Twig" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51754", "datePublished": "2024-11-06T19:28:17.553Z", "dateReserved": "2024-10-31T14:12:45.791Z", "dateUpdated": "2024-11-06T19:44:28.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51755
Vulnerability from cvelistv5
Published
2024-11-06 19:27
Modified
2024-11-07 15:12
Severity ?
EPSS score ?
Summary
Unguarded calls to __isset() and to array-accesses when the sandbox is enabled in Twig
References
▼ | URL | Tags |
---|---|---|
https://github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh | x_refsource_CONFIRM | |
https://github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51755", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T19:44:58.084307Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T19:45:07.091Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Twig", "vendor": "twigphp", "versions": [ { "status": "affected", "version": "\u003c 3.11.2" }, { "status": "affected", "version": "\u003e= 3.12.0, \u003c 3.14.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Twig is a template language for PHP. In a sandbox, an attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the security check. This is a BC break. This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-668", "description": "CWE-668: Exposure of Resource to Wrong Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-07T15:12:59.408Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh" }, { "name": "https://github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21" } ], "source": { "advisory": "GHSA-jjxq-ff2g-95vh", "discovery": "UNKNOWN" }, "title": "Unguarded calls to __isset() and to array-accesses when the sandbox is enabled in Twig" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51755", "datePublished": "2024-11-06T19:27:05.347Z", "dateReserved": "2024-10-31T14:12:45.791Z", "dateUpdated": "2024-11-07T15:12:59.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39261
Vulnerability from cvelistv5
Published
2022-09-28 00:00
Modified
2025-04-23 16:54
Severity ?
EPSS score ?
Summary
Twig may load a template outside a configured directory when using the filesystem loader
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33" }, { "tags": [ "x_transferred" ], "url": "https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b" }, { "tags": [ "x_transferred" ], "url": "https://www.drupal.org/sa-core-2022-016" }, { "name": "DSA-5248", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5248" }, { "name": "FEDORA-2022-4490a4772d", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUVTXMNPSZAHS3DWZEM56V5W4NPVR6L7/" }, { "name": "FEDORA-2022-d39b2a755b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OKRUHPVLIQVFPPJ2UWC3WV3WQO763NR/" }, { "name": "FEDORA-2022-1695454935", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YU4ZYX62H2NUAKKGUES4RZIM4KMTKZ7F/" }, { "name": "FEDORA-2022-9d8ee4a6de", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWRFPZSR74SYVJKBTKTMYUK36IJ3SQJP/" }, { "name": "[debian-lts-announce] 20221011 [SECURITY] [DLA 3147-1] twig security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00016.html" }, { "name": "FEDORA-2022-c6fe3ebd94", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW53TFJ6WWNXMUHOFACKATJTS7NIHVQE/" }, { "name": "FEDORA-2022-73b9fb7a77", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV5TNNJLGG536TJH6DLCIAAZZIPV2GUD/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-39261", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T15:50:56.522548Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T16:54:59.321Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Twig", "vendor": "twigphp", "versions": [ { "status": "affected", "version": "=\u003e 1.0.0, \u003c 1.44.7" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.15.3" }, { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates\u0027 directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T00:00:00.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33" }, { "url": "https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b" }, { "url": "https://www.drupal.org/sa-core-2022-016" }, { "name": "DSA-5248", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5248" }, { "name": "FEDORA-2022-4490a4772d", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUVTXMNPSZAHS3DWZEM56V5W4NPVR6L7/" }, { "name": "FEDORA-2022-d39b2a755b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OKRUHPVLIQVFPPJ2UWC3WV3WQO763NR/" }, { "name": "FEDORA-2022-1695454935", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YU4ZYX62H2NUAKKGUES4RZIM4KMTKZ7F/" }, { "name": "FEDORA-2022-9d8ee4a6de", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWRFPZSR74SYVJKBTKTMYUK36IJ3SQJP/" }, { "name": "[debian-lts-announce] 20221011 [SECURITY] [DLA 3147-1] twig security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00016.html" }, { "name": "FEDORA-2022-c6fe3ebd94", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW53TFJ6WWNXMUHOFACKATJTS7NIHVQE/" }, { "name": "FEDORA-2022-73b9fb7a77", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV5TNNJLGG536TJH6DLCIAAZZIPV2GUD/" } ], "source": { "advisory": "GHSA-52m2-vc4m-jj33", "discovery": "UNKNOWN" }, "title": "Twig may load a template outside a configured directory when using the filesystem loader" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39261", "datePublished": "2022-09-28T00:00:00.000Z", "dateReserved": "2022-09-02T00:00:00.000Z", "dateUpdated": "2025-04-23T16:54:59.321Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23614
Vulnerability from cvelistv5
Published
2022-02-04 22:25
Modified
2025-04-23 19:08
Severity ?
EPSS score ?
Summary
Code injection in Twig
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/twigphp/Twig/security/advisories/GHSA-5mv2-rx3q-4w2v" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/twigphp/Twig/commit/2eb33080558611201b55079d07ac88f207b466d5" }, { "name": "FEDORA-2022-167b9becef", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OTN4273U4RHVIXED64T7DSMJ3VYTPRE7/" }, { "name": "FEDORA-2022-47293b1d23", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PECHIY2XLWUH2WLCNPDGNFMPHPRPCEDZ/" }, { "name": "FEDORA-2022-7d871d7583", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I2PVV5DUTRUECTIHMTWRI5Z7DVNYQ2YO/" }, { "name": "FEDORA-2022-58abb323f0", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIGZCFSYLPP7UVJ4E4NLHSOQSKYNXSAD/" }, { "name": "DSA-5107", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5107" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-23614", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T15:56:43.403255Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T19:08:27.990Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Twig", "vendor": "twigphp", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.3.8" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.14.11" } ] } ], "descriptions": [ { "lang": "en", "value": "Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-24T14:06:10.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/twigphp/Twig/security/advisories/GHSA-5mv2-rx3q-4w2v" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/twigphp/Twig/commit/2eb33080558611201b55079d07ac88f207b466d5" }, { "name": "FEDORA-2022-167b9becef", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OTN4273U4RHVIXED64T7DSMJ3VYTPRE7/" }, { "name": "FEDORA-2022-47293b1d23", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PECHIY2XLWUH2WLCNPDGNFMPHPRPCEDZ/" }, { "name": "FEDORA-2022-7d871d7583", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I2PVV5DUTRUECTIHMTWRI5Z7DVNYQ2YO/" }, { "name": "FEDORA-2022-58abb323f0", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIGZCFSYLPP7UVJ4E4NLHSOQSKYNXSAD/" }, { "name": "DSA-5107", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2022/dsa-5107" } ], "source": { "advisory": "GHSA-5mv2-rx3q-4w2v", "discovery": "UNKNOWN" }, "title": "Code injection in Twig", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-23614", "STATE": "PUBLIC", "TITLE": "Code injection in Twig" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Twig", "version": { "version_data": [ { "version_value": "\u003e= 3.0.0, \u003c 3.3.8" }, { "version_value": "\u003e= 2.0.0, \u003c 2.14.11" } ] } } ] }, "vendor_name": "twigphp" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrade." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/twigphp/Twig/security/advisories/GHSA-5mv2-rx3q-4w2v", "refsource": "CONFIRM", "url": "https://github.com/twigphp/Twig/security/advisories/GHSA-5mv2-rx3q-4w2v" }, { "name": "https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9", "refsource": "MISC", "url": "https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9" }, { "name": "https://github.com/twigphp/Twig/commit/2eb33080558611201b55079d07ac88f207b466d5", "refsource": "MISC", "url": "https://github.com/twigphp/Twig/commit/2eb33080558611201b55079d07ac88f207b466d5" }, { "name": "FEDORA-2022-167b9becef", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTN4273U4RHVIXED64T7DSMJ3VYTPRE7/" }, { "name": "FEDORA-2022-47293b1d23", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PECHIY2XLWUH2WLCNPDGNFMPHPRPCEDZ/" }, { "name": "FEDORA-2022-7d871d7583", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2PVV5DUTRUECTIHMTWRI5Z7DVNYQ2YO/" }, { "name": "FEDORA-2022-58abb323f0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIGZCFSYLPP7UVJ4E4NLHSOQSKYNXSAD/" }, { "name": "DSA-5107", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5107" } ] }, "source": { "advisory": "GHSA-5mv2-rx3q-4w2v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23614", "datePublished": "2022-02-04T22:25:11.000Z", "dateReserved": "2022-01-19T00:00:00.000Z", "dateUpdated": "2025-04-23T19:08:27.990Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45411
Vulnerability from cvelistv5
Published
2024-09-09 18:20
Modified
2024-09-16 12:04
Severity ?
EPSS score ?
Summary
Twig has a possible sandbox bypass
References
▼ | URL | Tags |
---|---|---|
https://github.com/twigphp/Twig/security/advisories/GHSA-6j75-5wfj-gh66 | x_refsource_CONFIRM | |
https://github.com/twigphp/Twig/commit/11f68e2aeb526bfaf638e30d4420d8a710f3f7c6 | x_refsource_MISC | |
https://github.com/twigphp/Twig/commit/2102dd135986db79192d26fb5f5817a566e0a7de | x_refsource_MISC | |
https://github.com/twigphp/Twig/commit/7afa198603de49d147e90d18062e7b9addcf5233 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "twig", "vendor": "symfony", "versions": [ { "lessThan": "1.44.8", "status": "affected", "version": "1.0.0", "versionType": "custom" }, { "lessThan": "2.16.1", "status": "affected", "version": "2.0.0", "versionType": "custom" }, { "lessThan": "3.14.0", "status": "affected", "version": "3.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45411", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T18:37:50.091764Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-09T18:39:52.204Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-16T12:04:18.107Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00031.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Twig", "vendor": "twigphp", "versions": [ { "status": "affected", "version": "\u003e 1.0.0, \u003c 1.44.8" }, { "status": "affected", "version": "\u003e 2.0.0, \u003c 2.16.1" }, { "status": "affected", "version": "\u003e 3.0.0, \u003c 3.14.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Twig is a template language for PHP. Under some circumstances, the sandbox security checks are not run which allows user-contributed templates to bypass the sandbox restrictions. This vulnerability is fixed in 1.44.8, 2.16.1, and 3.14.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693: Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T18:20:28.363Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/twigphp/Twig/security/advisories/GHSA-6j75-5wfj-gh66", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/twigphp/Twig/security/advisories/GHSA-6j75-5wfj-gh66" }, { "name": "https://github.com/twigphp/Twig/commit/11f68e2aeb526bfaf638e30d4420d8a710f3f7c6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/twigphp/Twig/commit/11f68e2aeb526bfaf638e30d4420d8a710f3f7c6" }, { "name": "https://github.com/twigphp/Twig/commit/2102dd135986db79192d26fb5f5817a566e0a7de", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/twigphp/Twig/commit/2102dd135986db79192d26fb5f5817a566e0a7de" }, { "name": "https://github.com/twigphp/Twig/commit/7afa198603de49d147e90d18062e7b9addcf5233", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/twigphp/Twig/commit/7afa198603de49d147e90d18062e7b9addcf5233" } ], "source": { "advisory": "GHSA-6j75-5wfj-gh66", "discovery": "UNKNOWN" }, "title": "Twig has a possible sandbox bypass" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45411", "datePublished": "2024-09-09T18:20:28.363Z", "dateReserved": "2024-08-28T20:21:32.805Z", "dateUpdated": "2024-09-16T12:04:18.107Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }