Vulnerabilities
Vulnerable Software
Getgrav:  >> Grav  >> 0.9.2  Security Vulnerabilities
Grav is a flat-file content management system. Prior to version 1.7.42, there is a logic flaw in the `GravExtension.filterFilter()` function whereby validation against a denylist of unsafe functions is only performed when the argument passed to filter is a string. However, passing an array as a callable argument allows the validation check to be skipped. Consequently, a low privileged attacker with login access to Grav Admin panel and page creation/update permissions is able to inject malicious templates to obtain remote code execution. The vulnerability can be found in the `GravExtension.filterFilter()` function declared in `/system/src/Grav/Common/Twig/Extension/GravExtension.php`. Version 1.7.42 contains a patch for this issue. End users should also ensure that `twig.undefined_functions` and `twig.undefined_filters` properties in `/path/to/webroot/system/config/system.yaml` configuration file are set to `false` to disallow Twig from treating undefined filters/functions as PHP functions and executing them.
CVSS Score
8.8
EPSS Score
0.003
Published
2023-06-14
Code Injection in GitHub repository getgrav/grav prior to 1.7.34.
CVSS Score
9.1
EPSS Score
0.002
Published
2022-06-29
stored xss in GitHub repository getgrav/grav prior to 1.7.33.
CVSS Score
8.2
EPSS Score
0.004
Published
2022-04-26
Cross-site Scripting (XSS) - Stored in GitHub repository getgrav/grav prior to 1.7.31.
CVSS Score
7.1
EPSS Score
0.004
Published
2022-03-15
Cross-site Scripting (XSS) - Stored in GitHub repository getgrav/grav prior to 1.7.31.
CVSS Score
4.6
EPSS Score
0.003
Published
2022-02-28
Cross-site Scripting (XSS) - Stored in Packagist getgrav/grav prior to 1.7.28.
CVSS Score
5.7
EPSS Score
0.003
Published
2022-01-25
grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVSS Score
8.8
EPSS Score
0.01
Published
2021-11-05
grav is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSS Score
6.3
EPSS Score
0.002
Published
2021-10-27
grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking
CVSS Score
6.3
EPSS Score
0.003
Published
2021-09-27
Grav is a file based Web-platform. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. The issue was addressed in version 1.7.11.
CVSS Score
8.4
EPSS Score
0.184
Published
2021-04-13


Contact Us

Shodan ® - All rights reserved