Plugins Database As of 12-11-2019

Symfony 3.4.0 <= 3.4.34, 4.2.0 <= 4.2.11 and 4.3.0 <= 4.3.7 Remote Code Execution Vulnerability

Web application abuses
Impact by CVSS Score
  • ID: 1.3.6.1.4.1.25623.1.0.112671

CVSS Base Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Detection Type:
Remote Banner Unreliable

Solution Type:
Vendor Patch

Summary:
Symfony is prone to a remote code execution.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
When an instance of TagAwareAdapter is destructed, Symfony execute callables stored in privates properties in order to invalidates tags. When the instance has been created by unserializing an external payload, those properties are not checked leading to a remote code execution.

Affected Versions:
Symfony 3.4.0 to 3.4.34, 4.2.0 to 4.2.11 and 4.3.0 to 4.3.7.

Recommendations:
The issue has been fixed in Symfony 3.4.35, 4.2.12 and 4.3.8. NOTE: No fixes are provided for Symfony 3.1, 3.2, 3.3, 4.0 and 4.1 as they are not maintained anymore.

Search
Severity
Medium
CVSS Score
6.8
Published
2019-11-22 10:38:11
Modified
2019-11-22 10:58:15
CVE
CVE-2019-18889

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.