CVE-2023-34252

CVSS 3.1 Score 7.2 of 10 (high)

Details

Published Jun 14, 2023
Updated: Nov 7, 2023
CWE ID 94
CWE ID 1336
CWE ID 184

Summary

CVE-2023-34252 is a logic flaw affecting the Grav content management system before version 1.7.42. The issue lies in the `GravExtension.filterFilter()` function, where validation against a denylist of unsafe functions is bypassed when an array is passed as a callable argument instead of a string. This allows a low-privileged attacker with access to the Grav Admin panel and page creation/update permissions to inject malicious templates and achieve remote code execution. The vulnerability resides in the `GravExtension.filterFilter()` function declared in `/system/src/Grav/Common/Twig/Extension/GravExtension.php`. Grav users are recommended to update to version 1.7.42 to apply the patch and set `twig.undefined_functions` and `twig.undefined_filters` properties to `false` in the `/path/to/webroot/system/config/system.yaml` configuration file to prevent Twig from executing undefined functions or filters.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-34252 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions