In a sandbox, and attacker can access attributes of Array-like objects as they were not checked by the security policy.
They are now checked via the property policy and the __isset()
method is now called after the security check.
This is a BC break.
The sandbox mode now ensures access to array-like's properties is allowed.
The patch for this issue is available here for the 3.11.x branch, and here for the 3.x branch.
We would like to thank Jamie Schouten for reporting the issue and Nicolas Grekas for providing the fix.
{ "nvd_published_at": "2024-11-06T20:15:06Z", "cwe_ids": [ "CWE-668" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2024-11-06T19:52:55Z" }