We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-51755

Unguarded calls to __isset() and to array-accesses when the sandbox is enabled in Twig



AssignerGitHub_M
Reserved2024-10-31
Published2024-11-06
Updated2024-11-06

Description

Twig is a template language for PHP. In a sandbox, and attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the security check. This is a BC break. This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.



LOW: 2.2CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N

Product status

< 3.11.2
affected

>= 3.12.0, < 3.14.1
affected

References

https://github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh

https://github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21

cve.org CVE-2024-51755

nvd.nist.gov CVE-2024-51755

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.