An issue was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1. When using the scalar type hint `string` in a setter method (e.g. `setName(string $name)`) of a class that's the `data_class` of a form, and when a file upload is submitted to the corresponding field instead of a normal text input, then `UploadedFile::__toString()` is called which will then return and disclose the path of the uploaded file. If combined with a local file inclusion issue in certain circumstances this could escalate it to a Remote Code Execution.
References
Link | Resource |
---|---|
https://symfony.com/blog/cve-2018-19789-disclosure-of-uploaded-files-full-path | Patch Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OA4WVFN5FYPIXAPLWZI6N425JHHDSWAZ/ | Release Notes Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZMRJ7VTHCY5AZK24G4QGX36RLUDTDKE/ | Release Notes Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TD3E7FZIXLVFG3SMFJPDEKPZ26TJOW7/ | Release Notes Third Party Advisory |
http://www.securityfocus.com/bid/106249 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2019/dsa-4441 | |
https://seclists.org/bugtraq/2019/May/21 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-12-18 14:29
Updated : 2019-05-10 09:29
NVD link : CVE-2018-19789
Mitre link : CVE-2018-19789
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
debian
- debian_linux
sensiolabs
- symfony