// For flags

CVE-2020-5218

Ability in Sylius to switch channels via GET parameter enabled in production environments

Severity Score

4.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Affected versions of Sylius give attackers the ability to switch channels via the _channel_code GET parameter in production environments. This was meant to be enabled only when kernel.debug is set to true. However, if no sylius_channel.debug is set explicitly in the configuration, the default value which is kernel.debug will be not resolved and cast to boolean, enabling this debug feature even if that parameter is set to false. Patch has been provided for Sylius 1.3.x and newer - 1.3.16, 1.4.12, 1.5.9, 1.6.5. Versions older than 1.3 are not covered by our security support anymore.

Las versiones afectadas de Sylius otorgan a atacantes la capacidad de cambiar canales por medio del parámetro GET de _channel_code en entornos de producción. Esto estaba destinado a ser habilitado solo cuando kernel.debug es seteado en verdadero. Sin embargo, si no se establece explícitamente sylius_channel.debug en la configuración, el valor predeterminado que es kernel.debug no se resolverá y se convertirá en booleano, habilitando esta funcionalidad de depuración incluso si ese parámetro se establece en falso. El path se ha proporcionado para Sylius versiones 1.3.x y posteriores; versiones 1.3.16, 1.4.12, 1.5.9, 1.6.5. Las versiones anteriores a la 1.3 ya no están cubiertas por nuestro soporte de seguridad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-02 CVE Reserved
  • 2020-01-27 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sylius
Search vendor "Sylius"
Sylius
Search vendor "Sylius" for product "Sylius"
>= 1.3.0 < 1.3.13
Search vendor "Sylius" for product "Sylius" and version " >= 1.3.0 < 1.3.13"
-
Affected
Sylius
Search vendor "Sylius"
Sylius
Search vendor "Sylius" for product "Sylius"
>= 1.4.0 < 1.4.6
Search vendor "Sylius" for product "Sylius" and version " >= 1.4.0 < 1.4.6"
-
Affected
Sylius
Search vendor "Sylius"
Sylius
Search vendor "Sylius" for product "Sylius"
>= 1.6.0 < 1.6.3
Search vendor "Sylius" for product "Sylius" and version " >= 1.6.0 < 1.6.3"
-
Affected
Sylius
Search vendor "Sylius"
Sylius
Search vendor "Sylius" for product "Sylius"
1.5.0
Search vendor "Sylius" for product "Sylius" and version "1.5.0"
-
Affected