Логотип exploitDog
product: "symfony"
Консоль
Логотип exploitDog

exploitDog

product: "symfony"
Symfony

Symfonyфреймворк c открытым исходным кодом, написанный на PHP.

Релизный цикл, информация об уязвимостях

Продукт: Symfony
Вендор: SensioLabs

График релизов

5.46.16.26.37.06.47.17.27.32021202220232024202520262027202820292030

Недавние уязвимости Symfony

Количество 244

ubuntu логотип

CVE-2021-32693

около 4 лет назад

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. A vulnerability related to firewall authentication is in Symfony starting with version 5.3.0 and prior to 5.3.2. When an application defines multiple firewalls, the token authenticated by one of the firewalls was available for all other firewalls. This could be abused when the application defines different providers for each part of the application, in such a situation, a user authenticated on a part of the application could be considered authenticated on the rest of the application. Starting in version 5.3.2, a patch ensures that the authenticated token is only available for the firewall that generates it.

CVSS3: 6.8
EPSS: Низкий
fstec логотип

BDU:2021-03315

около 4 лет назад

Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, связанная с ошибками при обработке аутентифицированных токенов, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-5pv8-ppvj-4h68

около 4 лет назад

Prevent user enumeration using Guard or the new Authenticator-based Security

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2021-21424

около 4 лет назад

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The ability to enumerate users was possible without relevant permissions due to different handling depending on whether the user existed or not when attempting to use the switch users functionality. We now ensure that 403s are returned whether the user exists or not if a user cannot switch to a user or if the user does not exist. The patch for this issue is available for branch 3.4.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2021-21424

около 4 лет назад

Symfony is a PHP framework for web and console applications and a set ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2021-21424

около 4 лет назад

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The ability to enumerate users was possible without relevant permissions due to different handling depending on whether the user existed or not when attempting to use the switch users functionality. We now ensure that 403s are returned whether the user exists or not if a user cannot switch to a user or if the user does not exist. The patch for this issue is available for branch 3.4.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2021-03305

около 4 лет назад

Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2020-15094

почти 5 лет назад

In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by CachingHttpClient and if an attacker can control the response for a request being made by the CachingHttpClient, remote code execution is possible. This has been fixed in versions 4.4.13 and 5.1.5.

CVSS3: 8
EPSS: Низкий
debian логотип

CVE-2020-15094

почти 5 лет назад

In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient cla ...

CVSS3: 8
EPSS: Низкий
ubuntu логотип

CVE-2020-15094

почти 5 лет назад

In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by CachingHttpClient and if an attacker can control the response for a request being made by the CachingHttpClient, remote code execution is possible. This has been fixed in versions 4.4.13 and 5.1.5.

CVSS3: 8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
ubuntu логотип
CVE-2021-32693

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. A vulnerability related to firewall authentication is in Symfony starting with version 5.3.0 and prior to 5.3.2. When an application defines multiple firewalls, the token authenticated by one of the firewalls was available for all other firewalls. This could be abused when the application defines different providers for each part of the application, in such a situation, a user authenticated on a part of the application could be considered authenticated on the rest of the application. Starting in version 5.3.2, a patch ensures that the authenticated token is only available for the firewall that generates it.

CVSS3: 6.8
1%
Низкий
около 4 лет назад
fstec логотип
BDU:2021-03315

Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, связанная с ошибками при обработке аутентифицированных токенов, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
1%
Низкий
около 4 лет назад
github логотип
GHSA-5pv8-ppvj-4h68

Prevent user enumeration using Guard or the new Authenticator-based Security

CVSS3: 5.3
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-21424

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The ability to enumerate users was possible without relevant permissions due to different handling depending on whether the user existed or not when attempting to use the switch users functionality. We now ensure that 403s are returned whether the user exists or not if a user cannot switch to a user or if the user does not exist. The patch for this issue is available for branch 3.4.

CVSS3: 5.3
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-21424

Symfony is a PHP framework for web and console applications and a set ...

CVSS3: 5.3
0%
Низкий
около 4 лет назад
ubuntu логотип
CVE-2021-21424

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The ability to enumerate users was possible without relevant permissions due to different handling depending on whether the user existed or not when attempting to use the switch users functionality. We now ensure that 403s are returned whether the user exists or not if a user cannot switch to a user or if the user does not exist. The patch for this issue is available for branch 3.4.

CVSS3: 5.3
0%
Низкий
около 4 лет назад
fstec логотип
BDU:2021-03305

Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.3
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2020-15094

In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by CachingHttpClient and if an attacker can control the response for a request being made by the CachingHttpClient, remote code execution is possible. This has been fixed in versions 4.4.13 and 5.1.5.

CVSS3: 8
2%
Низкий
почти 5 лет назад
debian логотип
CVE-2020-15094

In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient cla ...

CVSS3: 8
2%
Низкий
почти 5 лет назад
ubuntu логотип
CVE-2020-15094

In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by CachingHttpClient and if an attacker can control the response for a request being made by the CachingHttpClient, remote code execution is possible. This has been fixed in versions 4.4.13 and 5.1.5.

CVSS3: 8
2%
Низкий
почти 5 лет назад

Уязвимостей на страницу


Поделиться