Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-5255

Опубликовано: 30 мар. 2020
Источник: debian

Описание

In Symfony before versions 4.4.7 and 5.0.7, when a `Response` does not contain a `Content-Type` header, affected versions of Symfony can fallback to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can prevent the use of the website by other users. This has been patched in versions 4.4.7 and 5.0.7.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
symfonyfixed4.4.8-1package
symfonynot-affectedbusterpackage
symfonynot-affectedstretchpackage
symfonynot-affectedjessiepackage

Примечания

  • https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-content-type-header

  • https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6

Связанные уязвимости

CVSS3: 2.6
ubuntu
около 5 лет назад

In Symfony before versions 4.4.7 and 5.0.7, when a `Response` does not contain a `Content-Type` header, affected versions of Symfony can fallback to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can prevent the use of the website by other users. This has been patched in versions 4.4.7 and 5.0.7.

CVSS3: 2.6
nvd
около 5 лет назад

In Symfony before versions 4.4.7 and 5.0.7, when a `Response` does not contain a `Content-Type` header, affected versions of Symfony can fallback to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can prevent the use of the website by other users. This has been patched in versions 4.4.7 and 5.0.7.

CVSS3: 2.6
github
около 5 лет назад

Prevent cache poisoning via a Response Content-Type header in Symfony