CVE-2024-51755: Twig has unguarded calls to `__isset()` and to array-accesses when the sandbox is enabled
(updated )
In a sandbox, and attacker can access attributes of Array-like objects as they were not checked by the security policy.
They are now checked via the property policy and the __isset()
method is now called after the security check.
This is a BC break.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2024-51755.yaml
- github.com/advisories/GHSA-jjxq-ff2g-95vh
- github.com/twigphp/Twig
- github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21
- github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh
- nvd.nist.gov/vuln/detail/CVE-2024-51755
- symfony.com/blog/unguarded-calls-to-__isset-and-to-array-accesses-when-the-sandbox-is-enabled
Detect and mitigate CVE-2024-51755 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →