Search for packages
Package details: pkg:composer/twig/twig@2.3.2
purl pkg:composer/twig/twig@2.3.2
Next non-vulnerable version 3.11.2
Latest non-vulnerable version 3.19.0
Risk 4.4
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-8921-71jv-uubp
Aliases:
CVE-2024-51754
GHSA-6377-hfv9-hqf6
Twig has unguarded calls to `__toString()` when nesting an object into an array ### Description In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). ### Resolution The sandbox mode now checks the `__toString()` method call on all objects. The patch for this issue is available [here](https://github.com/twigphp/Twig/commit/cafc608ece310e62a35a76f17e25c04ab9ed05cc) for the 3.11.x branch, and [here](https://github.com/twigphp/Twig/commit/d4a302681bca9f7c6ce2835470d53609cdf3e23e) for the 3.x branch. ### Credits We would like to thank Jamie Schouten for reporting the issue and Fabien Potencier for providing the fix.
3.11.2
Affected by 0 other vulnerabilities.
3.14.1
Affected by 0 other vulnerabilities.
VCID-f37e-ycrv-zua7
Aliases:
CVE-2022-39261
GHSA-52m2-vc4m-jj33
Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.
2.15.3
Affected by 3 other vulnerabilities.
3.0.0-BETA1
Affected by 2 other vulnerabilities.
3.4.3
Affected by 3 other vulnerabilities.
VCID-ra6y-zf7y-zyc7
Aliases:
CVE-2024-45411
GHSA-6j75-5wfj-gh66
Twig has a possible sandbox bypass ### Description Under some circumstances, the sandbox security checks are not run which allows user-contributed templates to bypass the sandbox restrictions. The security issue happens when all these conditions are met: * The sandbox is disabled globally; * The sandbox is enabled via a sandboxed `include()` function which references a template name (like `included.twig`) and not a `Template` or `TemplateWrapper` instance; * The included template has been loaded before the `include()` call but in a non-sandbox context (possible as the sandbox has been globally disabled). ### Resolution The patch ensures that the sandbox security checks are always run at runtime. ### Credits We would like to thank Fabien Potencier for reporting and fixing the issue.
2.16.1
Affected by 2 other vulnerabilities.
3.0.0-BETA1
Affected by 2 other vulnerabilities.
3.11.1
Affected by 2 other vulnerabilities.
3.14.0
Affected by 2 other vulnerabilities.
VCID-w767-6vb1-ukeh
Aliases:
CVE-2022-23614
GHSA-5mv2-rx3q-4w2v
Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrade.
2.14.11
Affected by 4 other vulnerabilities.
3.0.0-BETA1
Affected by 2 other vulnerabilities.
3.3.8
Affected by 4 other vulnerabilities.
VCID-yx59-ufsr-4fff
Aliases:
CVE-2019-9942
GHSA-vxrc-68xx-x48g
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.
2.7.0
Affected by 5 other vulnerabilities.
VCID-z5up-z5bq-7kbg
Aliases:
2019-03-12
Sandbox Information Disclosure.
2.7.0
Affected by 5 other vulnerabilities.
VCID-zwzx-hces-hkfk
Aliases:
CVE-2024-51755
GHSA-jjxq-ff2g-95vh
Twig has unguarded calls to `__isset()` and to array-accesses when the sandbox is enabled ### Description In a sandbox, and attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the security check. **This is a BC break.** ### Resolution The sandbox mode now ensures access to array-like's properties is allowed. The patch for this issue is available [here](https://github.com/twigphp/Twig/commit/ec39a9dccc5fb4eaaba55e5d79a6f84a8dd8b69d) for the 3.11.x branch, and [here](https://github.com/twigphp/Twig/commit/b957e5a44cc0075d04ccff52f8fa9d8e6db3e3a0) for the 3.x branch. ### Credits We would like to thank Jamie Schouten for reporting the issue and Nicolas Grekas for providing the fix.
3.11.2
Affected by 0 other vulnerabilities.
3.14.1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.