Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mrqx-rp3w-jpjp

Опубликовано: 06 нояб. 2024
Источник: github
Github: Прошло ревью
CVSS4: 2.3
CVSS3: 3.1

Описание

Symfony vulnerable to open redirect via browser-sanitized URLs

Description

The Request class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the Request class to redirect users to another domain.

Resolution

The Request::create methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/

The patch for this issue is available here for branch 5.4.

Credits

We would like to thank Sam Mush - IPASSLab && ZGC Lab for reporting the issue and Nicolas Grekas for providing the fix.

Пакеты

Наименование

symfony/http-foundation

composer
Затронутые версииВерсия исправления

< 5.4.46

5.4.46

Наименование

symfony/http-foundation

composer
Затронутые версииВерсия исправления

>= 6.0.0, < 6.4.14

6.4.14

Наименование

symfony/http-foundation

composer
Затронутые версииВерсия исправления

>= 7.0.0, < 7.1.7

7.1.7

EPSS

Процентиль: 28%
0.00098
Низкий

2.3 Low

CVSS4

3.1 Low

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 3.1
ubuntu
9 месяцев назад

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
nvd
9 месяцев назад

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
debian
9 месяцев назад

symfony/http-foundation is a module for the Symphony PHP framework whi ...

CVSS3: 3.1
fstec
9 месяцев назад

Уязвимость компонента http-foundation программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 7.3
redos
около 1 месяца назад

Множественные уязвимости php-symfony4

EPSS

Процентиль: 28%
0.00098
Низкий

2.3 Low

CVSS4

3.1 Low

CVSS3

Дефекты

CWE-601