Vulnerability can be exploited when end users are allowed to submit Twig templates, even if they are protected with Twig's sandbox mode. End users can craft valid Twig code that allows them to execute arbitrary code (RCEs) via the _self variable, which is always available, even in sandboxed templates. All versions of Twig are affected up to 1.20.0, which fixes this bug. Upstream patch: https://github.com/twigphp/Twig/pull/1759 CVE request: http://seclists.org/oss-sec/2015/q3/415
Created php-twig-Twig tracking bugs for this issue: Affects: epel-6 [bug 1255798]
Created php-twig tracking bugs for this issue: Affects: fedora-all [bug 1255796] Affects: epel-7 [bug 1255797]
php-twig-1.20.0-1.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report.
php-twig-1.20.0-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
php-twig-1.20.0-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
All dependent bugs are closed. Would you close this tracking bug as well?
Yes, thanks for resolving.
CVE-2015-7809 was assigned for the following issue: https://github.com/fabpot/Twig/commit/30be07759a3de2558da5224f127d052ecf492e8f per: http://seclists.org/oss-sec/2015/q4/60