July 18, 2023, 9:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

Grav is a file-based Web-platform built in PHP. Grav is subject to a server side template injection (SSTI) vulnerability. The fix for another SSTI vulnerability using `|map`, `|filter` and `|reduce` twigs implemented in the commit `71bbed1` introduces bypass of the denylist due to incorrect return value from `isDangerousFunction()`, which allows to execute the payload prepending double backslash (`\\`). The `isDangerousFunction()` check in version 1.7.42 and onwards retuns `false` value instead of `true` when the `\` symbol is found in the …

bypass cve file filter fix injection map payload php platform return server server side ssti template template injection value vulnerability web

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Grp 59 - Cyber System Exploitation CO-OP (July-December, 2024)

@ MIT Lincoln Laboratory | Lexington, MA, US

SecOps Transformation Advisor

@ Palo Alto Networks | Santa Clara, CA, United States

Cybersecurity Editor

@ Launch Potato | Halifax, Canada (remote)

Security Consultant

@ LRQA | Singapore, Singapore, SG, 119963

Senior Security Engineer

@ Splash | Canada (Remote in Eastern or Central time zones)