First published: Mon Sep 09 2024(Updated: )
### Description Under some circumstances, the sandbox security checks are not run which allows user-contributed templates to bypass the sandbox restrictions. The security issue happens when all these conditions are met: * The sandbox is disabled globally; * The sandbox is enabled via a sandboxed `include()` function which references a template name (like `included.twig`) and not a `Template` or `TemplateWrapper` instance; * The included template has been loaded before the `include()` call but in a non-sandbox context (possible as the sandbox has been globally disabled). ### Resolution The patch ensures that the sandbox security checks are always run at runtime. ### Credits We would like to thank Fabien Potencier for reporting and fixing the issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/twig/twig | >=3.0.0<3.11.1 | 3.11.1 |
composer/twig/twig | >=3.12.0<3.14.0 | 3.14.0 |
composer/twig/twig | >=2.0.0<2.16.1 | 2.16.1 |
composer/twig/twig | >=1.0.0<1.44.8 | 1.44.8 |
symfony Twig | >=1.0.0<1.44.8 | |
symfony Twig | >=2.0.0<2.16.1 | |
symfony Twig | >=3.0.0<3.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45411 is considered a critical vulnerability due to its potential to allow bypassing of sandbox restrictions.
To fix CVE-2024-45411, update the Twig package to versions 1.44.8, 2.16.1, 3.11.1, or 3.14.0.
CVE-2024-45411 affects Twig versions below 1.44.8, 2.16.1, 3.11.1, and 3.14.0.
The vulnerability occurs when the sandbox is globally disabled and managed incorrectly, allowing user-contributed templates to bypass security checks.
Users of the Twig templating engine who have disabled sandbox security checks are at risk for CVE-2024-45411.