Vonage-Community / sample-core-laravel_php-sandbox

Some sandbox code for use with various PHP-SDK products
0 stars 0 forks source link

fruitcake/laravel-cors-v2.0.5: 1 vulnerabilities (highest severity is: 3.1) #4

Open mend-for-github-com[bot] opened 3 weeks ago

mend-for-github-com[bot] commented 3 weeks ago
Vulnerable Library - fruitcake/laravel-cors-v2.0.5

Found in HEAD commit: 28a6c7cfa5160073d4146b827a79a6fcd2be3429

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (fruitcake/laravel-cors-v2.0.5 version) Remediation Possible**
CVE-2024-50345 Low 3.1 symfony/http-foundation-v6.0.3 Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-50345 ### Vulnerable Library - symfony/http-foundation-v6.0.3

Defines an object-oriented layer for the HTTP specification

Library home page: https://api.github.com/repos/symfony/http-foundation/zipball/ad157299ced81a637fade1efcadd688d6deba5c1

Dependency Hierarchy: - fruitcake/laravel-cors-v2.0.5 (Root Library) - :x: **symfony/http-foundation-v6.0.3** (Vulnerable Library)

Found in HEAD commit: 28a6c7cfa5160073d4146b827a79a6fcd2be3429

Found in base branch: main

### Vulnerability Details

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The "Request" class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the "Request" class to redirect users to another domain. The "Request::create" methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Publish Date: 2024-11-06

URL: CVE-2024-50345

### CVSS 3 Score Details (3.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/symfony/symfony/security/advisories/GHSA-mrqx-rp3w-jpjp

Release Date: 2024-11-06

Fix Resolution: symfony/http-foundation - v5.4.46,v6.4.14,v7.1.7