Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default `filter()` function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions, thereby allowing for remote code execution. A patch in version 1.74.2 overrides the built-in Twig `map()` and `reduce()` filter functions in `system/src/Grav/Common/Twig/Extension/GravExtension.php` to validate the argument passed to the filter in `$arrow`.
History

Wed, 18 Dec 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-06-14T22:06:01.338Z

Updated: 2024-12-18T21:38:44.207Z

Reserved: 2023-06-06T16:16:53.558Z

Link: CVE-2023-34448

cve-icon Vulnrichment

Updated: 2024-08-02T16:10:06.973Z

cve-icon NVD

Status : Modified

Published: 2023-06-14T23:15:11.107

Modified: 2024-11-21T08:07:16.537

Link: CVE-2023-34448

cve-icon Redhat

No data.