DEBIAN-CVE-2024-51754

Source
https://security-tracker.debian.org/tracker/CVE-2024-51754
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-51754.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-51754
Upstream
Published
2024-11-06T20:15:05Z
Modified
2025-09-19T07:34:12.461939Z
Summary
[none]
Details

Twig is a template language for PHP. In a sandbox, an attacker can call __toString() on an object even if the __toString() method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.

References

Affected packages

Debian:11 / php-twig

Package

Name
php-twig
Purl
pkg:deb/debian/php-twig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.14.3-1+deb11u4

Affected versions

2.*

2.14.3-1
2.14.3-1+deb11u1
2.14.3-1+deb11u2
2.14.3-1+deb11u3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / php-twig

Package

Name
php-twig
Purl
pkg:deb/debian/php-twig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.14.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / php-twig

Package

Name
php-twig
Purl
pkg:deb/debian/php-twig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.14.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}