Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 06 Nov 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue. | |
Title | Unguarded calls to __toString() when nesting an object into an array in Twig | |
Weaknesses | CWE-668 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-11-06T19:28:17.553Z
Updated: 2024-11-06T19:44:28.082Z
Reserved: 2024-10-31T14:12:45.791Z
Link: CVE-2024-51754
Vulnrichment
Updated: 2024-11-06T19:40:27.539Z
NVD
Status : Awaiting Analysis
Published: 2024-11-06T20:15:05.817
Modified: 2024-11-08T19:01:25.633
Link: CVE-2024-51754
Redhat
No data.