What kind of vulnerability is it? Who is impacted?
An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution.
Has the problem been patched? What versions should users upgrade to?
The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0
Is there a way for users to fix or remediate the vulnerability without upgrading?
Overwrite the service sulu_route.generator.expression_token_provider
and wrap the translator before passing it to the expression language.
Are there any links users can visit to find out more?
Currently not.
If you have any questions or comments about this advisory: * Open an issue in example link to repo * Email us at example email address
{ "nvd_published_at": "2021-12-15T20:15:00Z", "github_reviewed_at": "2021-12-15T22:27:31Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-22" ] }