CVE-2023-34448
CVSS V2 None
CVSS V3 None
Description
Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default `filter()` function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions, thereby allowing for remote code execution. A patch in version 1.74.2 overrides the built-in Twig `map()` and `reduce()` filter functions in `system/src/Grav/Common/Twig/Extension/GravExtension.php` to validate the argument passed to the filter in `$arrow`.
Overview
- CVE ID
- CVE-2023-34448
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-06-14T22:06:01.338Z
- Last Modified Date
- 2023-06-14T22:16:40.551Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/getgrav/grav/security/advisories/GHSA-whr7-m3f8-mpm8 | x_refsource_CONFIRM |
https://github.com/getgrav/grav/commit/8c2c1cb72611a399f13423fc6d0e1d998c03e5c8 | x_refsource_MISC |
https://github.com/twigphp/Twig/blob/v1.44.7/src/Environment.php#L148 | x_refsource_MISC |
https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/ | x_refsource_MISC |
https://www.github.com/getgrav/grav/commit/9d6a2dba09fd4e56f5cdfb9a399caea355bfeb83 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-34448 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34448 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 20:13:45 | Added to TrackCVE |