Skip to content

Twig has a possible sandbox bypass

High severity GitHub Reviewed Published Sep 9, 2024 in twigphp/Twig • Updated Sep 10, 2024

Package

composer twig/twig (Composer)

Affected versions

>= 1.0.0, < 1.44.8
>= 2.0.0, < 2.16.1
>= 3.12.0, < 3.14.0
>= 3.0.0, < 3.11.1

Patched versions

1.44.8
2.16.1
3.14.0
3.11.1

Description

Description

Under some circumstances, the sandbox security checks are not run which allows user-contributed templates to bypass the sandbox restrictions.

The security issue happens when all these conditions are met:

  • The sandbox is disabled globally;
  • The sandbox is enabled via a sandboxed include() function which references a template name (like included.twig) and not a Template or TemplateWrapper instance;
  • The included template has been loaded before the include() call but in a non-sandbox context (possible as the sandbox has been globally disabled).

Resolution

The patch ensures that the sandbox security checks are always run at runtime.

Credits

We would like to thank Fabien Potencier for reporting and fixing the issue.

References

@fabpot fabpot published to twigphp/Twig Sep 9, 2024
Published by the National Vulnerability Database Sep 9, 2024
Published to the GitHub Advisory Database Sep 9, 2024
Reviewed Sep 9, 2024
Last updated Sep 10, 2024

Severity

High

EPSS score

0.129%
(48th percentile)

Weaknesses

CVE ID

CVE-2024-45411

GHSA ID

GHSA-6j75-5wfj-gh66

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.