logo

CVE-2023-46734 symfony/twig-bridge

Package

Manager: composer
Name: symfony/twig-bridge
Vulnerable Version: >=2.0.0 <4.4.51 || >=5.0.0 <5.4.31 || >=6.0.0 <6.3.8

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

EPSS: 0.00989 pctl0.76001

Details

Symfony potential Cross-site Scripting vulnerabilities in CodeExtension filters ### Description Some Twig filters in CodeExtension use "is_safe=html" but don't actually ensure their input is safe. ### Resolution Symfony now escapes the output of the affected filters. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/9da9a145ce57e4585031ad4bee37c497353eec7c) for branch 4.4. ### Credits We would like to thank Pierre Rudloff for reporting the issue and to Nicolas Grekas for providing the fix.

Metadata

Created: 2023-11-12T15:52:51Z
Modified: 2023-11-12T15:52:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-q847-2q57-wmr3/GHSA-q847-2q57-wmr3.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-q847-2q57-wmr3
Finding: F008
Auto approve: 1