CVE-2018-19789
Published: 18 December 2018
An issue was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1. When using the scalar type hint `string` in a setter method (e.g. `setName(string $name)`) of a class that's the `data_class` of a form, and when a file upload is submitted to the corresponding field instead of a normal text input, then `UploadedFile::__toString()` is called which will then return and disclose the path of the uploaded file. If combined with a local file inclusion issue in certain circumstances this could escalate it to a Remote Code Execution.
Priority
Status
Package | Release | Status |
---|---|---|
symfony Launchpad, Ubuntu, Debian |
bionic |
Needed
|
cosmic |
Ignored
(end of life)
|
|
disco |
Not vulnerable
(3.4.20+dfsg-1)
|
|
eoan |
Not vulnerable
(3.4.20+dfsg-1)
|
|
focal |
Not vulnerable
(3.4.20+dfsg-1)
|
|
groovy |
Not vulnerable
(3.4.20+dfsg-1)
|
|
hirsute |
Not vulnerable
(3.4.20+dfsg-1)
|
|
impish |
Not vulnerable
(3.4.20+dfsg-1)
|
|
jammy |
Not vulnerable
(3.4.20+dfsg-1)
|
|
kinetic |
Not vulnerable
(3.4.20+dfsg-1)
|
|
lunar |
Not vulnerable
(3.4.20+dfsg-1)
|
|
mantic |
Not vulnerable
(3.4.20+dfsg-1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(3.4.20+dfsg-1)
|
|
xenial |
Needed
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |