First published: Tue Mar 12 2019(Updated: )
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/twig/twig | <1.38.0>=2.0.0<2.7.0 | |
composer/twig/twig | >=2.0.0<2.7.0 | 2.7.0 |
composer/twig/twig | <1.38.0 | 1.38.0 |
debian/twig | 2.6.2-2 2.6.2-2+deb10u1 | |
Symfony Twig | <1.38.0 | |
Symfony Twig | >=2.0.0<2.7.0 | |
Debian Debian Linux | =9.0 | |
<1.38.0 | ||
>=2.0.0<2.7.0 | ||
=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-9942.
The severity of CVE-2019-9942 is medium with a severity value of 3.7.
The affected software for CVE-2019-9942 includes Twig before 1.38.0 and 2.x before 2.7.0.
Under some circumstances, it is possible to call the `__toString()` method on an object even if not allowed by the security policy in place, leading to information disclosure.
To fix the sandbox information disclosure vulnerability, update Twig to version 1.38.0 or 2.7.0 or later.