Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-14774

Опубликовано: 03 авг. 2018
Источник: debian
EPSS Низкий

Описание

An issue was discovered in HttpKernel in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. When using HttpCache, the values of the X-Forwarded-Host headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
symfonyfixed3.4.14+dfsg-1package
symfonyno-dsastretchpackage
symfonynot-affectedjessiepackage

Примечания

  • https://symfony.com/blog/cve-2018-14774-possible-host-header-injection-when-using-httpcache

EPSS

Процентиль: 37%
0.00153
Низкий

Связанные уязвимости

CVSS3: 7.2
ubuntu
почти 7 лет назад

An issue was discovered in HttpKernel in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. When using HttpCache, the values of the X-Forwarded-Host headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection.

CVSS3: 7.2
nvd
почти 7 лет назад

An issue was discovered in HttpKernel in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. When using HttpCache, the values of the X-Forwarded-Host headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection.

CVSS3: 7.2
github
около 3 лет назад

Symfony Host Header Injection

EPSS

Процентиль: 37%
0.00153
Низкий