CVE-2020-15094

In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by CachingHttpClient and if an attacker can control the response for a request being made by the CachingHttpClient, remote code execution is possible. This has been fixed in versions 4.4.13 and 5.1.5.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sensiolabs:httpclient:*:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:httpclient:*:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Information

Published : 2020-09-02 11:15

Updated : 2023-01-23 18:07


NVD link : CVE-2020-15094

Mitre link : CVE-2020-15094


JSON object : View

CWE
CWE-212

Improper Removal of Sensitive Information Before Storage or Transfer

Advertisement

dedicated server usa

Products Affected

sensiolabs

  • httpclient
  • symfony

fedoraproject

  • fedora