High severityNVD Advisory· Published Apr 13, 2021· Updated Aug 3, 2024
Twig allowing dangerous PHP functions by default
CVE-2021-29440
Description
Grav is a file based Web-platform. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. The issue was addressed in version 1.7.11.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
getgrav/gravPackagist | < 1.7.11 | 1.7.11 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-g8r4-p96j-xfxcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-29440ghsaADVISORY
- packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.htmlghsax_refsource_MISCWEB
- blog.sonarsource.com/grav-cms-code-execution-vulnerabilitiesghsax_refsource_MISCWEB
- github.com/getgrav/grav/security/advisories/GHSA-g8r4-p96j-xfxcghsax_refsource_CONFIRMWEB
- packagist.org/packages/getgrav/gravghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.