This repository has been archived by the owner on Dec 5, 2024. It is now read-only.
symfony/runtime-v6.2.8: 1 vulnerabilities (highest severity is: 7.3) #619
Labels
Mend: dependency security vulnerability
Security vulnerability detected by Mend
Vulnerable Library - symfony/runtime-v6.2.8
Enables decoupling PHP applications from global state
Library home page: https://api.github.com/repos/symfony/runtime/zipball/f8b0751b33888329be8f8f0481bb81d279ec4157
Found in HEAD commit: 25671a7609a83910381d92265b840e9e308bd5dd
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-50340
Vulnerable Library - symfony/runtime-v6.2.8
Enables decoupling PHP applications from global state
Library home page: https://api.github.com/repos/symfony/runtime/zipball/f8b0751b33888329be8f8f0481bb81d279ec4157
Dependency Hierarchy:
Found in HEAD commit: 25671a7609a83910381d92265b840e9e308bd5dd
Found in base branch: develop
Vulnerability Details
symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the "register_argv_argc" php directive is set to "on" , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the "SymfonyRuntime" now ignores the "argv" values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Publish Date: 2024-11-06
URL: CVE-2024-50340
CVSS 3 Score Details (7.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-x8vp-gf4q-mw5j
Release Date: 2024-11-06
Fix Resolution: symfony/runtime - v5.4.46,v6.4.14,v7.1.7
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: