CVE-2024-45411

high

Description

Twig is a template language for PHP. Under some circumstances, the sandbox security checks are not run which allows user-contributed templates to bypass the sandbox restrictions. This vulnerability is fixed in 1.44.8, 2.16.1, and 3.14.0.

References

https://github.com/twigphp/Twig/security/advisories/GHSA-6j75-5wfj-gh66

https://github.com/twigphp/Twig/commit/7afa198603de49d147e90d18062e7b9addcf5233

https://github.com/twigphp/Twig/commit/2102dd135986db79192d26fb5f5817a566e0a7de

https://github.com/twigphp/Twig/commit/11f68e2aeb526bfaf638e30d4420d8a710f3f7c6

Details

Source: Mitre, NVD

Published: 2024-09-09

Updated: 2024-09-19

Risk Information

CVSS v2

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:N

Severity: High

CVSS v3

Base Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

Severity: High