In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by CachingHttpClient and if an attacker can control the response for a request being made by the CachingHttpClient, remote code execution is possible. This has been fixed in versions 4.4.13 and 5.1.5.
References
Link | Resource |
---|---|
https://github.com/symfony/symfony/security/advisories/GHSA-754h-5r27-7x3r | Third Party Advisory |
https://packagist.org/packages/symfony/http-kernel | Product Third Party Advisory |
https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78 | Patch Third Party Advisory |
https://packagist.org/packages/symfony/symfony | Product Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VAQJXAKWPMWB7OL6QPG2ZSEQZYYPU5RC/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGUWOEETOFVH4PN3I3YO4QZHQ4AUKF3/ | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2020-09-02 11:15
Updated : 2023-01-23 18:07
NVD link : CVE-2020-15094
Mitre link : CVE-2020-15094
JSON object : View
CWE
CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
Products Affected
sensiolabs
- httpclient
- symfony
fedoraproject
- fedora