cve/2024/CVE-2024-51754.md
2025-09-29 21:09:30 +02:00

19 lines
1.0 KiB
Markdown

### [CVE-2024-51754](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51754)
![](https://img.shields.io/static/v1?label=Product&message=Twig&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%203.11.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%203.12.0%2C%20%3C%203.14.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere&color=brightgreen)
### Description
Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/w4zu/Debian_security