CVE-2018-19789

Severity CVSS v4.0:
Pending analysis
Type:
CWE-434 Unrestricted Upload of File with Dangerous Type
Publication date:
18/12/2018
Last modified:
07/11/2023

Description

An issue was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1. When using the scalar type hint `string` in a setter method (e.g. `setName(string $name)`) of a class that's the `data_class` of a form, and when a file upload is submitted to the corresponding field instead of a normal text input, then `UploadedFile::__toString()` is called which will then return and disclose the path of the uploaded file. If combined with a local file inclusion issue in certain circumstances this could escalate it to a Remote Code Execution.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:* 2.7.0 (including) 2.7.50 (excluding)
cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:* 2.8.0 (including) 2.8.49 (excluding)
cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:* 3.0.0 (including) 3.4.20 (excluding)
cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:* 4.0.0 (including) 4.0.15 (excluding)
cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:* 4.1.0 (including) 4.1.9 (excluding)
cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:* 4.2.0 (including) 4.2.1 (excluding)
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*