tt9133github / ForTest2

0 stars 0 forks source link

CVE-2019-18888 (High) detected in symfony/http-foundation-v2.8.28 #451

Open mend-bolt-for-github[bot] opened 7 months ago

mend-bolt-for-github[bot] commented 7 months ago

CVE-2019-18888 - High Severity Vulnerability

Vulnerable Library - symfony/http-foundation-v2.8.28

Symfony HttpFoundation Component

Library home page: https://api.github.com/repos/symfony/http-foundation/zipball/e6e0170e134bf25d03030b71a19ca409e036157a

Dependency Hierarchy: - drupal/core-8.3.6 (Root Library) - :x: **symfony/http-foundation-v2.8.28** (Vulnerable Library)

Found in HEAD commit: 27e1f740a162e55490d9ca929f243afbaa92476c

Found in base branch: master

Vulnerability Details

An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. This is related to symfony/http-foundation (and symfony/mime in 4.3.x).

Publish Date: 2019-11-21

URL: CVE-2019-18888

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://symfony.com/blog/cve-2019-18888-prevent-argument-injection-in-a-mimetypeguesser

Release Date: 2019-11-21

Fix Resolution: v2.8.52,v3.4.35,v4.2.12,v4.3.8


Step up your Open Source Security Game with Mend here