Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-51755

Опубликовано: 06 нояб. 2024
Источник: ubuntu
Приоритет: medium
CVSS3: 2.2

Описание

Twig is a template language for PHP. In a sandbox, an attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the __isset() method is now called after the security check. This is a BC break. This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

РелизСтатусПримечание
devel

not-affected

esm-apps/focal

needed

esm-apps/jammy

needed

esm-apps/noble

needed

focal

ignored

end of standard support, was needed
jammy

needed

noble

needed

oracular

ignored

end of life, was needed
plucky

not-affected

questing

not-affected

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

questing

DNE

Показывать по

2.2 Low

CVSS3

Связанные уязвимости

CVSS3: 2.2
nvd
больше 1 года назад

Twig is a template language for PHP. In a sandbox, an attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the security check. This is a BC break. This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

CVSS3: 2.2
debian
больше 1 года назад

Twig is a template language for PHP. In a sandbox, an attacker can acc ...

CVSS3: 2.2
github
больше 1 года назад

Twig has unguarded calls to `__isset()` and to array-accesses when the sandbox is enabled

2.2 Low

CVSS3