Логотип exploitDog
bind:CVE-2023-34448
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-34448

Количество 2

Количество 2

nvd логотип

CVE-2023-34448

больше 2 лет назад

Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default `filter()` function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions, thereby allowing for remote code execution. A patch in version 1.74.2 overrides the built-in Twig `map()` and `reduce()` filter functions in `system/src/Grav/Common/Twig/Extension/GravExtension.php` to validate the argument passed to the filter in `$arrow`.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-whr7-m3f8-mpm8

больше 2 лет назад

Grav Server-side Template Injection (SSTI) via Twig Default Filters

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-34448

Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default `filter()` function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions, thereby allowing for remote code execution. A patch in version 1.74.2 overrides the built-in Twig `map()` and `reduce()` filter functions in `system/src/Grav/Common/Twig/Extension/GravExtension.php` to validate the argument passed to the filter in `$arrow`.

CVSS3: 8.8
8%
Низкий
больше 2 лет назад
github логотип
GHSA-whr7-m3f8-mpm8

Grav Server-side Template Injection (SSTI) via Twig Default Filters

CVSS3: 7.2
8%
Низкий
больше 2 лет назад

Уязвимостей на страницу