Vulnerability Description
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Symfony | Twig | < 1.38.0 |
| Debian | Debian Linux | 9.0 |
References
- https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077PatchThird Party Advisory
- https://seclists.org/bugtraq/2019/Mar/60Mailing ListThird Party Advisory
- https://symfony.com/blog/twig-sandbox-information-disclosurePatchVendor Advisory
- https://www.debian.org/security/2019/dsa-4419Third Party Advisory
- https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077PatchThird Party Advisory
- https://seclists.org/bugtraq/2019/Mar/60Mailing ListThird Party Advisory
- https://symfony.com/blog/twig-sandbox-information-disclosurePatchVendor Advisory
- https://www.debian.org/security/2019/dsa-4419Third Party Advisory
FAQ
What is CVE-2019-9942?
CVE-2019-9942 is a vulnerability with a CVSS score of 3.7 (LOW). A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by...
How severe is CVE-2019-9942?
CVE-2019-9942 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9942?
Check the references section above for vendor advisories and patch information. Affected products include: Symfony Twig, Debian Debian Linux.