Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-23614
HistoryFeb 04, 2022 - 10:25 p.m.

CVE-2022-23614 Code injection in Twig

2022-02-0422:25:11
CWE-74
GitHub_M
www.cve.org
3
cve-2022-23614
code injection
twig
php
sandbox mode
sort filter
closure
arbitrary php code
patched

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.019

Percentile

88.6%

Twig is an open source template language for PHP. When in a sandbox mode, the arrow parameter of the sort filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the sort filter as is the case for some other filters. Users are advised to upgrade.

CNA Affected

[
  {
    "product": "Twig",
    "vendor": "twigphp",
    "versions": [
      {
        "status": "affected",
        "version": ">= 3.0.0, < 3.3.8"
      },
      {
        "status": "affected",
        "version": ">= 2.0.0, < 2.14.11"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.019

Percentile

88.6%