NA

CVE-2022-39261

Published: 28/09/2022 Updated: 07/11/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Twig is a template language for PHP. Versions 1.x before 1.44.7, 2.x before 2.15.3, and 3.x before 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

symfony twig

drupal drupal

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #1020991 php-twig: CVE-2022-39261 Package: src:php-twig; Maintainer for src:php-twig is Debian PHP PEAR Maintainers <pkg-php-pear@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 30 Sep 2022 07:45:01 UTC Severity: grave Tags: security, upstream Found ...
Marlon Starkloff discovered that twig, a template engine for PHP, did not correctly enforce sandboxing This would allow a malicious user to execute arbitrary code For the stable distribution (bullseye), this problem has been fixed in version 2143-1+deb11u2 We recommend that you upgrade your php-twig packages For the detailed security status o ...

Github Repositories

Github Advisory Scanner

Symfony Inspector Command Clone git clone gitlabcom/typomedia/inspectorgit cd inspector/ composer install --no-dev Download inspectorphar Usage bin/inspector check [options] [--] [<name>] Arguments lockfile The path to the composerlock file [default: "c