Lucene search

K
nvd[email protected]NVD:CVE-2023-37897
HistoryJul 18, 2023 - 9:15 p.m.

CVE-2023-37897

2023-07-1821:15:15
CWE-74
CWE-393
web.nvd.nist.gov
3
grav
php
ssti
vulnerability
denylist
fix
version 1.7.42.2

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

52.1%

Grav is a file-based Web-platform built in PHP. Grav is subject to a server side template injection (SSTI) vulnerability. The fix for another SSTI vulnerability using |map, |filter and |reduce twigs implemented in the commit 71bbed1 introduces bypass of the denylist due to incorrect return value from isDangerousFunction(), which allows to execute the payload prepending double backslash (\\). The isDangerousFunction() check in version 1.7.42 and onwards retuns false value instead of true when the \ symbol is found in the $name. This vulnerability can be exploited if the attacker has access to: 1. an Administrator account, or 2. a non-administrator, user account that has Admin panel access and Create/Update page permissions. A fix for this vulnerability has been introduced in commit b4c6210 and is included in release version 1.7.42.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

Nvd
Node
getgravgravMatch1.7.42
OR
getgravgravMatch1.7.42.1
VendorProductVersionCPE
getgravgrav1.7.42cpe:2.3:a:getgrav:grav:1.7.42:*:*:*:*:*:*:*
getgravgrav1.7.42.1cpe:2.3:a:getgrav:grav:1.7.42.1:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

52.1%

Related for NVD:CVE-2023-37897