Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. getgrav/grav
  4. ›
  5. CVE-2023-37897

CVE-2023-37897: Return of Wrong Status Code

July 19, 2023 (updated July 21, 2023)

Grav is a file-based Web-platform built in PHP. Grav is subject to a server side template injection (SSTI) vulnerability. The fix for another SSTI vulnerability using |map, |filter and |reduce twigs implemented in the commit 71bbed1 introduces bypass of the denylist due to incorrect return value from isDangerousFunction(), which allows to execute the payload prepending double backslash (\\). The isDangerousFunction() check in version 1.7.42 and onwards retuns false value instead of true when the \ symbol is found in the $name. This vulnerability can be exploited if the attacker has access to: 1. an Administrator account, or 2. a non-administrator, user account that has Admin panel access and Create/Update page permissions. A fix for this vulnerability has been introduced in commit b4c6210 and is included in release version 1.7.42.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

  • github.com/advisories/GHSA-9436-3gmp-4f53
  • github.com/getgrav/grav/commit/71bbed12f950de8335006d7f91112263d8504f1b
  • github.com/getgrav/grav/commit/b4c62101a43051fc7f5349c7d0a5b6085375c1d7
  • github.com/getgrav/grav/security/advisories/GHSA-9436-3gmp-4f53
  • nvd.nist.gov/vuln/detail/CVE-2023-37897

Code Behaviors & Features

Detect and mitigate CVE-2023-37897 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.7.42.1

Fixed versions

  • 1.7.42.2

Solution

Upgrade to version 1.7.42.2 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-393: Return of Wrong Status Code
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

packagist/getgrav/grav/CVE-2023-37897.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:04 +0000.