CVE-2024-51754

NameCVE-2024-51754
DescriptionTwig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1086884

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php-twig (PTS)bullseye2.14.3-1+deb11u2vulnerable
bullseye (security)2.14.3-1+deb11u3vulnerable
bookworm, bookworm (security)3.5.1-1+deb12u1vulnerable
trixie3.14.2-3fixed
sid3.15.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php-twigsource(unstable)3.14.2-11086884
twigsource(unstable)(unfixed)

Notes

[bookworm] - php-twig <no-dsa> (Minor issue)
[bullseye] - php-twig <postponed> (Minor template sandbox escape)
https://github.com/twigphp/Twig/security/advisories/GHSA-6377-hfv9-hqf6
Fixed by: https://github.com/twigphp/Twig/commit/2bb8c2460a2c519c498df9b643d5277117155a73 (v3.14.1)

Search for package or bug name: Reporting problems