First published: Wed Jun 14 2023(Updated: )
Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default `filter()` function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions, thereby allowing for remote code execution. A patch in version 1.74.2 overrides the built-in Twig `map()` and `reduce()` filter functions in `system/src/Grav/Common/Twig/Extension/GravExtension.php` to validate the argument passed to the filter in `$arrow`.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Getgrav Grav | <1.7.42 | |
composer/getgrav/grav | <1.7.42 | 1.7.42 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34448 is a server-side template injection vulnerability in Grav prior to version 1.7.42 that can be exploited using the default `filter()` function.
CVE-2023-34448 has a severity rating of 7.2, which is considered high.
Grav prior to version 1.7.42 is affected by CVE-2023-34448.
CVE-2023-34448 can be exploited by leveraging the default `filter()` function in Grav to perform server-side template injection.
Yes, a patch for CVE-2023-34448 is available in version 1.7.42 of Grav.