CVE-2023-46735
Symfony potential Cross-site Scripting in WebhookController
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in version 6.0.0 and prior to version 6.3.8, the error message in `WebhookController` returns unescaped user-submitted input. As of version 6.3.8, `WebhookController` now doesn't return any user-submitted input in its response.
Symfony es un framework PHP para aplicaciones web y de consola y un conjunto de componentes PHP reutilizables. A partir de la versión 6.0.0 y anteriores a la versión 6.3.8, el mensaje de error en `WebhookController` devuelve información enviada por el usuario sin formato de escape. A partir de la versión 6.3.8, `WebhookController` ahora no devuelve ninguna entrada enviada por el usuario en su respuesta.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-10-25 CVE Reserved
- 2023-11-10 CVE Published
- 2024-09-03 CVE Updated
- 2024-11-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/symfony/symfony/commit/8128c302430394f639e818a7103b3f6815d8d962 | 2023-11-16 | |
https://github.com/symfony/symfony/security/advisories/GHSA-72x2-5c85-6wmr | 2023-11-16 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 6.0.0 < 6.3.8 Search vendor "Sensiolabs" for product "Symfony" and version " >= 6.0.0 < 6.3.8" | - |
Affected
|