Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-51755

Опубликовано: 06 нояб. 2024
Источник: debian

Описание

Twig is a template language for PHP. In a sandbox, an attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the security check. This is a BC break. This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-twigfixed3.14.2-1package
php-twigno-dsabookwormpackage
php-twigignoredbullseyepackage
twigremovedpackage

Примечания

  • https://github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh

  • Fixed by: https://github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21 (v3.14.1)

Связанные уязвимости

CVSS3: 2.2
ubuntu
больше 1 года назад

Twig is a template language for PHP. In a sandbox, an attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the security check. This is a BC break. This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

CVSS3: 2.2
nvd
больше 1 года назад

Twig is a template language for PHP. In a sandbox, an attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the security check. This is a BC break. This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

CVSS3: 2.2
github
больше 1 года назад

Twig has unguarded calls to `__isset()` and to array-accesses when the sandbox is enabled