Open mend-bolt-for-github[bot] opened 3 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2015-2309 - High Severity Vulnerability
Vulnerable Library - symfony/symfony-v2.3.1
The Symfony PHP framework
Library home page: https://api.github.com/repos/symfony/symfony/zipball/0902c606b4df1161f5b786ae89f37b71380b1f23
Dependency Hierarchy: - :x: **symfony/symfony-v2.3.1** (Vulnerable Library)
Found in HEAD commit: 9505f4ca92405cc9273dc3726c2d274ce28a4407
Found in base branch: ALL_HANDS/major-secrets
Vulnerability Details
Symfony before 2.3.27, 2.5.11 and 2.6.6 is vulnerable to man-in-the-middle attack.The Symfony\Component\HttpFoundation\Request class provides a mechanism that ensures it does not trust HTTP header values coming from a "non-trusted" client. Unfortunately, it assumes that the remote address is always a trusted client if at least one trusted proxy is involved in the request. this allows a man-in-the-middle attack between the latest trusted proxy and the web server.
Publish Date: 2020-07-21
URL: CVE-2015-2309
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://symfony.com/blog/cve-2015-2309-unsafe-methods-in-the-request-class
Release Date: 2020-07-21
Fix Resolution: v2.3.27,v2.5.11,v2.6.6
Step up your Open Source Security Game with Mend here