Lucene search

K
debianDebianDEBIAN:DLA-3147-1:CBC79
HistoryOct 11, 2022 - 6:00 p.m.

[SECURITY] [DLA 3147-1] twig security update

2022-10-1118:00:56
lists.debian.org
9
twig security update
php templating library
arbitrary file read
cve-2022-39261
debian 10 buster

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.7

Confidence

High

EPSS

0.003

Percentile

71.1%


Debian LTS Advisory DLA-3147-1 [email protected]
https://www.debian.org/lts/security/ Chris Lamb
October 11, 2022 https://wiki.debian.org/LTS


Package : twig
Version : 2.6.2-2+deb10u1
CVE ID : CVE-2022-39261
Debian Bug : #1020991

It was discovered that there was a potential arbitrary file read
vulnerability in twig, a PHP templating library. It was caused by
insufficient validation of template names in 'source' and 'include'
statements.

For Debian 10 buster, this problem has been fixed in version
2.6.2-2+deb10u1.

We recommend that you upgrade your twig packages.

For the detailed security status of twig please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/twig

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.7

Confidence

High

EPSS

0.003

Percentile

71.1%