We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50340

Ability to change environment from query in symfony/runtime



Description

symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Reserved 2024-10-22 | Published 2024-11-06 | Updated 2024-11-07 | Assigner GitHub_M


HIGH: 7.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Problem types

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Product status

< 5.4.46
affected

>= 6.0.0, < 6.4.14
affected

>= 7.0.0, < 7.1.7
affected

References

github.com/...ymfony/security/advisories/GHSA-x8vp-gf4q-mw5j

github.com/...ommit/a77b308c3f179ed7c8a8bc295f82b2d6ee3493fa

cve.org (CVE-2024-50340)

nvd.nist.gov (CVE-2024-50340)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50340

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.