Headline
GHSA-q847-2q57-wmr3: Symfony potential Cross-site Scripting vulnerabilities in CodeExtension filters
Description
Some Twig filters in CodeExtension use “is_safe=html” but don’t actually ensure their input is safe.
Resolution
Symfony now escapes the output of the affected filters.
The patch for this issue is available here for branch 4.4.
Credits
We would like to thank Pierre Rudloff for reporting the issue and to Nicolas Grekas for providing the fix.
Skip to content
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
- Pricing
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-46734
Symfony potential Cross-site Scripting vulnerabilities in CodeExtension filters
Moderate severity GitHub Reviewed Published Nov 10, 2023 in symfony/symfony • Updated Nov 12, 2023
Package
composer symfony/symfony (Composer)
Affected versions
>= 2.0.0, < 4.4.51
>= 5.0.0, < 5.4.31
>= 6.0.0, < 6.3.8
Patched versions
4.4.51
5.4.31
6.3.8
>= 2.0.0, < 4.4.51
>= 5.0.0, < 5.4.31
>= 6.0.0, < 6.3.8
Description
Published to the GitHub Advisory Database
Nov 12, 2023
Last updated
Nov 12, 2023
Related news
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 2.0.0, 5.0.0, and 6.0.0 and prior to versions 4.4.51, 5.4.31, and 6.3.8, some Twig filters in CodeExtension use `is_safe=html` but don't actually ensure their input is safe. As of versions 4.4.51, 5.4.31, and 6.3.8, Symfony now escapes the output of the affected filters.