Логотип exploitDog
product: "symfony"
Консоль
Логотип exploitDog

exploitDog

product: "symfony"
Symfony

Symfonyфреймворк c открытым исходным кодом, написанный на PHP.

Релизный цикл, информация об уязвимостях

Продукт: Symfony
Вендор: SensioLabs

График релизов

5.46.16.26.37.06.47.17.27.38.07.42021202220232024202520262027202820292030

Недавние уязвимости Symfony

Количество 263

github логотип

GHSA-r2rq-3h56-fqm4

больше 3 лет назад

Symfony DoS

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-g4g7-q726-v5hg

больше 3 лет назад

Symfony CSRF Token Fixation

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-x3cf-w64x-4cp2

больше 3 лет назад

Symfony Path Disclosure

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-89r2-5g34-2g47

больше 3 лет назад

Symfony Open Redirect

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-92x6-h2gr-8gxq

больше 3 лет назад

Symfony CSRF Vulnerability

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-8wgj-6wx8-h5hq

больше 3 лет назад

Symfony HTTP Foundation web cache poisoning

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-22pv-7v9j-hqxp

больше 3 лет назад

Symfony Host Header Injection vulnerability in the HttpFoundation component

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-q8j7-fjh7-25v5

больше 3 лет назад

Symfony collectionCascaded and collectionCascadedDeeply fields security bypass

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-q8hg-pf8v-cxrv

почти 4 года назад

Symfony Http-Kernel has non-constant time comparison in UriSigner

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2022-23601

около 4 лет назад

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user. When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the configuration is not specified, by default, the mechanism is enabled as long as the session is enabled. In a recent change in the way the configuration is loaded, the default behavior has been dropped and, as a result, the CSRF protection is not enabled in form when not explicitly enabled, which makes the application sensible to CSRF attacks. This issue has been resolved in the patch versions listed and users are advised to update. There are no known workarounds for this issue.

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
CVSS3: 5.9
1%
Низкий
больше 3 лет назад
github логотип
GHSA-g4g7-q726-v5hg

Symfony CSRF Token Fixation

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-x3cf-w64x-4cp2

Symfony Path Disclosure

CVSS3: 5.3
1%
Низкий
больше 3 лет назад
github логотип
GHSA-89r2-5g34-2g47

Symfony Open Redirect

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-92x6-h2gr-8gxq

Symfony CSRF Vulnerability

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
github логотип
GHSA-8wgj-6wx8-h5hq

Symfony HTTP Foundation web cache poisoning

CVSS3: 6.5
4%
Низкий
больше 3 лет назад
github логотип
GHSA-22pv-7v9j-hqxp

Symfony Host Header Injection vulnerability in the HttpFoundation component

CVSS3: 6.1
1%
Низкий
больше 3 лет назад
github логотип
GHSA-q8j7-fjh7-25v5

Symfony collectionCascaded and collectionCascadedDeeply fields security bypass

CVSS3: 8.1
1%
Низкий
больше 3 лет назад
github логотип
GHSA-q8hg-pf8v-cxrv

Symfony Http-Kernel has non-constant time comparison in UriSigner

CVSS3: 8.1
1%
Низкий
почти 4 года назад
nvd логотип
CVE-2022-23601

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user. When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the configuration is not specified, by default, the mechanism is enabled as long as the session is enabled. In a recent change in the way the configuration is loaded, the default behavior has been dropped and, as a result, the CSRF protection is not enabled in form when not explicitly enabled, which makes the application sensible to CSRF attacks. This issue has been resolved in the patch versions listed and users are advised to update. There are no known workarounds for this issue.

CVSS3: 8.1
0%
Низкий
около 4 лет назад

Уязвимостей на страницу


Поделиться