Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1902 | Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default `filter()` function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions, thereby allowing for remote code execution. A patch in version 1.74.2 overrides the built-in Twig `map()` and `reduce()` filter functions in `system/src/Grav/Common/Twig/Extension/GravExtension.php` to validate the argument passed to the filter in `$arrow`. |
Github GHSA |
GHSA-whr7-m3f8-mpm8 | Grav Server-side Template Injection (SSTI) via Twig Default Filters |
Wed, 18 Dec 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-18T21:38:44.207Z
Reserved: 2023-06-06T16:16:53.558Z
Link: CVE-2023-34448
Updated: 2024-08-02T16:10:06.973Z
Status : Modified
Published: 2023-06-14T23:15:11.107
Modified: 2024-11-21T08:07:16.537
Link: CVE-2023-34448
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA