5.3
CVE-2018-19789
- EPSS 0.9%
- Published 18.12.2018 22:29:04
- Last modified 21.11.2024 03:58:33
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
An issue was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1. When using the scalar type hint `string` in a setter method (e.g. `setName(string $name)`) of a class that's the `data_class` of a form, and when a file upload is submitted to the corresponding field instead of a normal text input, then `UploadedFile::__toString()` is called which will then return and disclose the path of the uploaded file. If combined with a local file inclusion issue in certain circumstances this could escalate it to a Remote Code Execution.
Data is provided by the National Vulnerability Database (NVD)
Sensiolabs ≫ Symfony Version >= 2.7.0 < 2.7.50
Sensiolabs ≫ Symfony Version >= 2.8.0 < 2.8.49
Sensiolabs ≫ Symfony Version >= 3.0.0 < 3.4.20
Sensiolabs ≫ Symfony Version >= 4.0.0 < 4.0.15
Sensiolabs ≫ Symfony Version >= 4.1.0 < 4.1.9
Sensiolabs ≫ Symfony Version >= 4.2.0 < 4.2.1
Debian ≫ Debian Linux Version8.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.9% | 0.75 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.