Plugins Database As of 12-11-2019

Symfony 3.4.0 <= 3.4.34, 4.2.0 <= 4.2.11 and 4.3.0 <= 4.3.7 Remote Code Execution Vulnerability

Web application abuses
Impact by CVSS Score
  • ID:

CVSS Base Vector:

Detection Type:
Remote Banner Unreliable

Solution Type:
Vendor Patch

Symfony is prone to a remote code execution.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
When an instance of TagAwareAdapter is destructed, Symfony execute callables stored in privates properties in order to invalidates tags. When the instance has been created by unserializing an external payload, those properties are not checked leading to a remote code execution.

Affected Versions:
Symfony 3.4.0 to 3.4.34, 4.2.0 to 4.2.11 and 4.3.0 to 4.3.7.

The issue has been fixed in Symfony 3.4.35, 4.2.12 and 4.3.8. NOTE: No fixes are provided for Symfony 3.1, 3.2, 3.3, 4.0 and 4.1 as they are not maintained anymore.

CVSS Score
2019-11-22 10:38:11
2019-11-22 10:58:15

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.