Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-51754

Опубликовано: 06 нояб. 2024
Источник: debian
EPSS Низкий

Описание

Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-twigfixed3.14.2-1package
php-twigno-dsabookwormpackage
twigremovedpackage

Примечания

  • https://github.com/twigphp/Twig/security/advisories/GHSA-6377-hfv9-hqf6

  • Fixed by: https://github.com/twigphp/Twig/commit/2bb8c2460a2c519c498df9b643d5277117155a73 (v3.14.1)

EPSS

Процентиль: 28%
0.00099
Низкий

Связанные уязвимости

CVSS3: 2.2
ubuntu
больше 1 года назад

Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

CVSS3: 2.2
nvd
больше 1 года назад

Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

CVSS3: 2.2
github
больше 1 года назад

Twig has unguarded calls to `__toString()` when nesting an object into an array

EPSS

Процентиль: 28%
0.00099
Низкий