// For flags

CVE-2017-16790

 

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. When a form is submitted by the user, the request handler classes of the Form component merge POST data and uploaded files data into one array. This big array forms the data that are then bound to the form. At this stage there is no difference anymore between submitted POST data and uploaded files. A user can send a crafted HTTP request where the value of a "FileType" is sent as normal POST data that could be interpreted as a local file path on the server-side (for example, "file:///etc/passwd"). If the application did not perform any additional checks about the value submitted to the "FileType", the contents of the given file on the server could have been exposed to the attacker.

Se ha descubierto un problema en Symfony en versiones anteriores a la 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5 y 4.0-BETA5. Cuando un usuario envía un formulario, las clases del manipulador de petición del componente Form combinan los datos POST y suben los archivos en un array. Este array grande forma los datos que se enlazan al formulario. En este punto, ya no hay diferencias entre los datos POST enviados y los archivos subidos. Un usuario puede enviar una petición HTTP manipulada donde el valor de un "FileType" se envía como datos POST normales que podrían ser interpretados como ruta de archivo local del lado del servidor (por ejemplo, "file:///etc/passwd"). Si la aplicación no realiza comprobaciones adicionales sobre el valor enviado a "FileType", el contenido del archivo dado en el servidor podría haberse expuesto al atacante.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-10 CVE Reserved
  • 2018-08-06 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sensiolabs
Search vendor "Sensiolabs"
Symfony
Search vendor "Sensiolabs" for product "Symfony"
>= 2.7.0 <= 2.7.37
Search vendor "Sensiolabs" for product "Symfony" and version " >= 2.7.0 <= 2.7.37"
-
Affected
Sensiolabs
Search vendor "Sensiolabs"
Symfony
Search vendor "Sensiolabs" for product "Symfony"
>= 2.8.0 <= 2.8.30
Search vendor "Sensiolabs" for product "Symfony" and version " >= 2.8.0 <= 2.8.30"
-
Affected
Sensiolabs
Search vendor "Sensiolabs"
Symfony
Search vendor "Sensiolabs" for product "Symfony"
>= 3.2.0 <= 3.2.13
Search vendor "Sensiolabs" for product "Symfony" and version " >= 3.2.0 <= 3.2.13"
-
Affected
Sensiolabs
Search vendor "Sensiolabs"
Symfony
Search vendor "Sensiolabs" for product "Symfony"
>= 3.3.0 <= 3.3.12
Search vendor "Sensiolabs" for product "Symfony" and version " >= 3.3.0 <= 3.3.12"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected