CVE-2020-5218
Ability in Sylius to switch channels via GET parameter enabled in production environments
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Affected versions of Sylius give attackers the ability to switch channels via the _channel_code GET parameter in production environments. This was meant to be enabled only when kernel.debug is set to true. However, if no sylius_channel.debug is set explicitly in the configuration, the default value which is kernel.debug will be not resolved and cast to boolean, enabling this debug feature even if that parameter is set to false. Patch has been provided for Sylius 1.3.x and newer - 1.3.16, 1.4.12, 1.5.9, 1.6.5. Versions older than 1.3 are not covered by our security support anymore.
Las versiones afectadas de Sylius otorgan a atacantes la capacidad de cambiar canales por medio del parámetro GET de _channel_code en entornos de producción. Esto estaba destinado a ser habilitado solo cuando kernel.debug es seteado en verdadero. Sin embargo, si no se establece explícitamente sylius_channel.debug en la configuración, el valor predeterminado que es kernel.debug no se resolverá y se convertirá en booleano, habilitando esta funcionalidad de depuración incluso si ese parámetro se establece en falso. El path se ha proporcionado para Sylius versiones 1.3.x y posteriores; versiones 1.3.16, 1.4.12, 1.5.9, 1.6.5. Las versiones anteriores a la 1.3 ya no están cubiertas por nuestro soporte de seguridad.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-02 CVE Reserved
- 2020-01-27 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/resource-bundle/CVE-2020-5220.yaml | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-8vp7-j5cj-vvm2 | 2020-02-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sylius Search vendor "Sylius" | Sylius Search vendor "Sylius" for product "Sylius" | >= 1.3.0 < 1.3.13 Search vendor "Sylius" for product "Sylius" and version " >= 1.3.0 < 1.3.13" | - |
Affected
| ||||||
Sylius Search vendor "Sylius" | Sylius Search vendor "Sylius" for product "Sylius" | >= 1.4.0 < 1.4.6 Search vendor "Sylius" for product "Sylius" and version " >= 1.4.0 < 1.4.6" | - |
Affected
| ||||||
Sylius Search vendor "Sylius" | Sylius Search vendor "Sylius" for product "Sylius" | >= 1.6.0 < 1.6.3 Search vendor "Sylius" for product "Sylius" and version " >= 1.6.0 < 1.6.3" | - |
Affected
| ||||||
Sylius Search vendor "Sylius" | Sylius Search vendor "Sylius" for product "Sylius" | 1.5.0 Search vendor "Sylius" for product "Sylius" and version "1.5.0" | - |
Affected
|