CVE-2017-16654
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal.
Se ha descubierto un problema en Symfony en versiones anteriores a la 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5 y 4.0-BETA5. El componente Intl incluye varios lectores bundle que se emplean para leer bundles de recursos desde el sistema de archivos local. Los métodos read() de estas clases emplean una ruta y una locale para determinar qué bundle de idioma deben recuperar. El valor del argumento locale suele recuperarse desde entradas de usuario no fiables (como un parámetro URL). Un atacante puede emplear este argumento para navegar a directorios arbitrarios mediante el ataque dot-dot-slash (punto-punto-barra), también conocido como salto de directorio.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-11-07 CVE Reserved
- 2018-08-06 CVE Published
- 2024-08-05 CVE Updated
- 2024-11-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/symfony/symfony/pull/24994 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-out-of-paths | 2019-03-13 | |
https://www.debian.org/security/2018/dsa-4262 | 2019-03-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 2.7.0 <= 2.7.37 Search vendor "Sensiolabs" for product "Symfony" and version " >= 2.7.0 <= 2.7.37" | - |
Affected
| ||||||
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 3.2.0 <= 3.2.13 Search vendor "Sensiolabs" for product "Symfony" and version " >= 3.2.0 <= 3.2.13" | - |
Affected
| ||||||
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 3.3.0 <= 3.3.12 Search vendor "Sensiolabs" for product "Symfony" and version " >= 3.3.0 <= 3.3.12" | - |
Affected
| ||||||
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 3.8.0 <= 3.8.30 Search vendor "Sensiolabs" for product "Symfony" and version " >= 3.8.0 <= 3.8.30" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|