Symfony — фреймворк c открытым исходным кодом, написанный на PHP.
Релизный цикл, информация об уязвимостях
График релизов
Количество 255
CVE-2021-32693
Symfony is a PHP framework for web and console applications and a set ...
CVE-2021-32693
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. A vulnerability related to firewall authentication is in Symfony starting with version 5.3.0 and prior to 5.3.2. When an application defines multiple firewalls, the token authenticated by one of the firewalls was available for all other firewalls. This could be abused when the application defines different providers for each part of the application, in such a situation, a user authenticated on a part of the application could be considered authenticated on the rest of the application. Starting in version 5.3.2, a patch ensures that the authenticated token is only available for the firewall that generates it.
BDU:2021-03315
Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, связанная с ошибками при обработке аутентифицированных токенов, позволяющая нарушителю повысить свои привилегии
GHSA-5pv8-ppvj-4h68
Prevent user enumeration using Guard or the new Authenticator-based Security
CVE-2021-21424
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The ability to enumerate users was possible without relevant permissions due to different handling depending on whether the user existed or not when attempting to use the switch users functionality. We now ensure that 403s are returned whether the user exists or not if a user cannot switch to a user or if the user does not exist. The patch for this issue is available for branch 3.4.
CVE-2021-21424
Symfony is a PHP framework for web and console applications and a set ...
CVE-2021-21424
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The ability to enumerate users was possible without relevant permissions due to different handling depending on whether the user existed or not when attempting to use the switch users functionality. We now ensure that 403s are returned whether the user exists or not if a user cannot switch to a user or if the user does not exist. The patch for this issue is available for branch 3.4.
BDU:2021-03305
Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
CVE-2020-15094
In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by CachingHttpClient and if an attacker can control the response for a request being made by the CachingHttpClient, remote code execution is possible. This has been fixed in versions 4.4.13 and 5.1.5.
CVE-2020-15094
In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient cla ...
Уязвимостей на страницу
Уязвимость  | CVSS  | EPSS  | Опубликовано 1  | |
|---|---|---|---|---|
CVE-2021-32693 Symfony is a PHP framework for web and console applications and a set ...  | CVSS3: 6.8  | 1% Низкий | больше 4 лет назад | |
CVE-2021-32693 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. A vulnerability related to firewall authentication is in Symfony starting with version 5.3.0 and prior to 5.3.2. When an application defines multiple firewalls, the token authenticated by one of the firewalls was available for all other firewalls. This could be abused when the application defines different providers for each part of the application, in such a situation, a user authenticated on a part of the application could be considered authenticated on the rest of the application. Starting in version 5.3.2, a patch ensures that the authenticated token is only available for the firewall that generates it.  | CVSS3: 6.8  | 1% Низкий | больше 4 лет назад | |
BDU:2021-03315 Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, связанная с ошибками при обработке аутентифицированных токенов, позволяющая нарушителю повысить свои привилегии  | CVSS3: 8.8  | 1% Низкий | больше 4 лет назад | |
GHSA-5pv8-ppvj-4h68 Prevent user enumeration using Guard or the new Authenticator-based Security  | CVSS3: 5.3  | 0% Низкий | больше 4 лет назад | |
CVE-2021-21424 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The ability to enumerate users was possible without relevant permissions due to different handling depending on whether the user existed or not when attempting to use the switch users functionality. We now ensure that 403s are returned whether the user exists or not if a user cannot switch to a user or if the user does not exist. The patch for this issue is available for branch 3.4.  | CVSS3: 5.3  | 0% Низкий | больше 4 лет назад | |
CVE-2021-21424 Symfony is a PHP framework for web and console applications and a set ...  | CVSS3: 5.3  | 0% Низкий | больше 4 лет назад | |
CVE-2021-21424 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The ability to enumerate users was possible without relevant permissions due to different handling depending on whether the user existed or not when attempting to use the switch users functionality. We now ensure that 403s are returned whether the user exists or not if a user cannot switch to a user or if the user does not exist. The patch for this issue is available for branch 3.4.  | CVSS3: 5.3  | 0% Низкий | больше 4 лет назад | |
BDU:2021-03305 Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации  | CVSS3: 5.3  | 0% Низкий | больше 4 лет назад | |
CVE-2020-15094 In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by CachingHttpClient and if an attacker can control the response for a request being made by the CachingHttpClient, remote code execution is possible. This has been fixed in versions 4.4.13 and 5.1.5.  | CVSS3: 8  | 2% Низкий | около 5 лет назад | |
CVE-2020-15094 In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient cla ...  | CVSS3: 8  | 2% Низкий | около 5 лет назад | 
Уязвимостей на страницу