This week, Symfony 4.4.46, 5.4.13, 6.0.13 and 6.1.5 maintenance versions were released.
SymfonyCon Disneyland Paris 2022 is just around the corner! D-45!
As this event approaches we are proud to announce you the next speaker:
Symfony 6.1.5 has just been released.
Here is the list of the most important changes since 6.1.4:
Symfony 6.0.13 has just been released.
Here is the list of the most important changes since 6.0.12:
Symfony 5.4.13 has just been released.
Here is the list of the most important changes since 5.4.12:
Symfony 4.4.46 has just been released.
Here is the list of the most important changes since 4.4.45:
SymfonyCon Disneyland Paris 2022 is just around the corner! D-49!
As this event approaches we are proud to announce you the next speaker:
Did you notice that a new track appeared in the SymfonyCon Disneyland Paris 2022 program?
We are super excited to announce that new speakers are joining us and that you will discover them every day through the blog posts! Today it is the turn of:
Affected versions
Twig >1.0.0,<1.44.7 || >2.0.0,<2.15.3 || >3.0.0,<3.4.3 are affected by this security issue.
The issue has been fixed in Twig 1.44.7, 2.15.3 and 3.4.3.
Description
When using the filesystem loader to load templates for which the name is a user input, it is possible to use the source
or include
statement to read arbitrary files from outside the templates directory when using a namespace like @somewhere/../some.file
(in such a case, validation is bypassed).