CVE-2017-16790
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. When a form is submitted by the user, the request handler classes of the Form component merge POST data and uploaded files data into one array. This big array forms the data that are then bound to the form. At this stage there is no difference anymore between submitted POST data and uploaded files. A user can send a crafted HTTP request where the value of a "FileType" is sent as normal POST data that could be interpreted as a local file path on the server-side (for example, "file:///etc/passwd"). If the application did not perform any additional checks about the value submitted to the "FileType", the contents of the given file on the server could have been exposed to the attacker.
Se ha descubierto un problema en Symfony en versiones anteriores a la 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5 y 4.0-BETA5. Cuando un usuario envía un formulario, las clases del manipulador de petición del componente Form combinan los datos POST y suben los archivos en un array. Este array grande forma los datos que se enlazan al formulario. En este punto, ya no hay diferencias entre los datos POST enviados y los archivos subidos. Un usuario puede enviar una petición HTTP manipulada donde el valor de un "FileType" se envía como datos POST normales que podrían ser interpretados como ruta de archivo local del lado del servidor (por ejemplo, "file:///etc/passwd"). Si la aplicación no realiza comprobaciones adicionales sobre el valor enviado a "FileType", el contenido del archivo dado en el servidor podría haberse expuesto al atacante.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-11-10 CVE Reserved
- 2018-08-06 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://symfony.com/blog/cve-2017-16790-ensure-that-submitted-data-are-uploaded-files | 2018-10-11 |
URL | Date | SRC |
---|---|---|
https://www.debian.org/security/2018/dsa-4262 | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 2.7.0 <= 2.7.37 Search vendor "Sensiolabs" for product "Symfony" and version " >= 2.7.0 <= 2.7.37" | - |
Affected
| ||||||
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 2.8.0 <= 2.8.30 Search vendor "Sensiolabs" for product "Symfony" and version " >= 2.8.0 <= 2.8.30" | - |
Affected
| ||||||
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 3.2.0 <= 3.2.13 Search vendor "Sensiolabs" for product "Symfony" and version " >= 3.2.0 <= 3.2.13" | - |
Affected
| ||||||
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 3.3.0 <= 3.3.12 Search vendor "Sensiolabs" for product "Symfony" and version " >= 3.3.0 <= 3.3.12" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|