Описание
Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default filter() function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions, thereby allowing for remote code execution. A patch in version 1.74.2 overrides the built-in Twig map() and reduce() filter functions in system/src/Grav/Common/Twig/Extension/GravExtension.php to validate the argument passed to the filter in $arrow.
Ссылки
- PatchVendor Advisory
- Vendor Advisory
- Vendor Advisory
- ExploitPatchThird Party Advisory
- ExploitMitigationVendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- Vendor Advisory
- ExploitPatchThird Party Advisory
- ExploitMitigationVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.7.42 (исключая)
cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06764
Низкий
8.8 High
CVSS3
7.2 High
CVSS3
Дефекты
CWE-20
CWE-94
Связанные уязвимости
CVSS3: 7.2
github
больше 2 лет назад
Grav Server-side Template Injection (SSTI) via Twig Default Filters
EPSS
Процентиль: 91%
0.06764
Низкий
8.8 High
CVSS3
7.2 High
CVSS3
Дефекты
CWE-20
CWE-94