Skip to content

Grav's Twig processing allowing dangerous PHP functions by default

High severity GitHub Reviewed Published Apr 13, 2021 in getgrav/grav • Updated Jan 29, 2023

Package

composer getgrav/grav (Composer)

Affected versions

<= 1.7.10

Patched versions

1.7.11

Description

Impact

Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages.
As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance.

Patches

The issue was addressed by preventing dangerous functions from being called in Twig templates. A configuration option has been added to manually allow arbitrary PHP functions (system.twig.safe_functions) and filters (system.twig.safe_filters).

Futures major versions of Grav may disable this functionality by default.

Workarounds

Blocking access to the /admin path from untrusted sources will reduce the probability of exploitation.

References

For more information

If you have any questions or comments about this advisory, you can contact:

  • The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
  • The maintainers, by opening an issue on this repository.

References

@rhukster rhukster published to getgrav/grav Apr 13, 2021
Reviewed Apr 13, 2021
Published by the National Vulnerability Database Apr 13, 2021
Published to the GitHub Advisory Database Apr 16, 2021
Last updated Jan 29, 2023

Severity

High
8.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2021-29440

GHSA ID

GHSA-g8r4-p96j-xfxc

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.