CVE-2013-1397
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
02/06/2014
Last modified:
12/04/2025
Description
Symfony 2.0.x before 2.0.22, 2.1.x before 2.1.7, and 2.2.x remote attackers to execute arbitrary PHP code via a serialized PHP object to the (1) Yaml::parse or (2) Yaml\Parser::parse function, a different vulnerability than CVE-2013-1348.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:sensiolabs:symfony:2.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:sensiolabs:symfony:2.0.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/51980
- http://symfony.com/blog/security-release-symfony-2-0-22-and-2-1-7-released
- http://www.securityfocus.com/bid/57574
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81551
- http://secunia.com/advisories/51980
- http://symfony.com/blog/security-release-symfony-2-0-22-and-2-1-7-released
- http://www.securityfocus.com/bid/57574
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81551