Bug 2130762 (CVE-2022-39261) - CVE-2022-39261 twig: Possibility to load a template outside a configured directory when using the filesystem loader
Summary: CVE-2022-39261 twig: Possibility to load a template outside a configured dire...
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2022-39261
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2130766 2130763 2130764 2130765
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-09-29 04:21 UTC by Avinash Hanwate
Modified: 2022-11-28 21:24 UTC (History)
2 users (show)

Fixed In Version: twig 1.44.7, twig 2.15.3, twig 3.4.3
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-11-28 21:24:24 UTC
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2022-09-29 04:21:15 UTC
Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.

https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b
https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33
https://www.drupal.org/sa-core-2022-016

Comment 1 Avinash Hanwate 2022-09-29 04:21:53 UTC
Created php-twig tracking bugs for this issue:

Affects: epel-all [bug 2130766]
Affects: fedora-all [bug 2130763]


Created php-twig2 tracking bugs for this issue:

Affects: fedora-all [bug 2130764]


Created php-twig3 tracking bugs for this issue:

Affects: fedora-all [bug 2130765]

Comment 2 Product Security DevOps Team 2022-11-28 21:24:22 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.