CVE-2024-51755
CVSS V2 None
CVSS V3 None
Description
Twig is a template language for PHP. In a sandbox, and attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the security check. This is a BC break. This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.
Overview
- CVE ID
- CVE-2024-51755
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-11-06T19:27:05.347Z
- Last Modified Date
- 2024-11-06T19:45:07.091Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh | x_refsource_CONFIRM |
https://github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-51755 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51755 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-11-07 13:07:39 | Added to TrackCVE |