Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-50340— Ability to change environment from query in symfony/runtime

CVSS 7.3 · High EPSS 85.62% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-50340

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Ability to change environment from query in symfony/runtime
Source: NVD (National Vulnerability Database)
Vulnerability Description
symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
输出中的特殊元素转义处理不恰当(注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Symfony 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Symfony是Symfony公司的一个用于 Web 和控制台应用程序的 PHP 框架以及一组可重用的 PHP 组件。 Symfony存在注入漏洞,该漏洞源于允许将PHP应用程序与全局状态分离。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
symfonysymfony < 5.4.46 -

II. Public POCs for CVE-2024-50340

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/Nyamort/CVE-2024-50340POC Details
2symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-50340.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-50340

登录查看更多情报信息。

Same Patch Batch · symfony · 2024-11-06 · 6 CVEs total

CVE-2024-503423.1 LOWInternal address and port enumeration allowed by NoPrivateNetworkHttpClient in symfony/htt
CVE-2024-503413.1 LOWSecurity::login does not take into account custom user_checker in symfony/security-bundle
CVE-2024-503453.1 LOWOpen redirect via browser-sanitized URLs in symfony/http-foundation
CVE-2024-503433.1 LOWIncorrect response from Validator when input ends with `\n` in symfony/validator
CVE-2024-51736Command execution hijack on Windows with Process class in symfony/process

IV. Related Vulnerabilities

V. Comments for CVE-2024-50340

No comments yet


Leave a comment