Описание
Grav is a file based Web-platform. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. The issue was addressed in version 1.7.11.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- Third Party Advisory
- ProductThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- Third Party Advisory
- ProductThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.7.11 (исключая)
cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*
EPSS
Процентиль: 94%
0.14435
Средний
8.4 High
CVSS3
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94
Связанные уязвимости
CVSS3: 8.4
github
почти 5 лет назад
Grav's Twig processing allowing dangerous PHP functions by default
EPSS
Процентиль: 94%
0.14435
Средний
8.4 High
CVSS3
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94