First published: Mon Nov 26 2012(Updated: )
An information disclosure flaw was found in the way Symfony, a open-source PHP web framework, sanitized certain HTTP POST request values. A remote attacker could use this flaw to obtain (unauthorized) read access to arbitrary system files, readable with the privileges of the web server process. References: [1] <a href="http://symfony.com/blog/security-release-symfony-1-4-20-released">http://symfony.com/blog/security-release-symfony-1-4-20-released</a> [2] <a href="https://bugs.gentoo.org/show_bug.cgi?id=444696">https://bugs.gentoo.org/show_bug.cgi?id=444696</a> Relevant upstream patch: [3] <a href="http://trac.symfony-project.org/changeset/33598">http://trac.symfony-project.org/changeset/33598</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SensioLabs Symfony | <=1.4.19 | |
SensioLabs Symfony | =1.4.0 | |
SensioLabs Symfony | =1.4.0-rc1 | |
SensioLabs Symfony | =1.4.0-rc2 | |
SensioLabs Symfony | =1.4.1 | |
SensioLabs Symfony | =1.4.2 | |
SensioLabs Symfony | =1.4.3 | |
SensioLabs Symfony | =1.4.4 | |
SensioLabs Symfony | =1.4.5 | |
SensioLabs Symfony | =1.4.6 | |
SensioLabs Symfony | =1.4.7 | |
SensioLabs Symfony | =1.4.8 | |
SensioLabs Symfony | =1.4.9 | |
SensioLabs Symfony | =1.4.10 | |
SensioLabs Symfony | =1.4.11 | |
SensioLabs Symfony | =1.4.12 | |
SensioLabs Symfony | =1.4.13 | |
SensioLabs Symfony | =1.4.14 | |
SensioLabs Symfony | =1.4.15 | |
SensioLabs Symfony | =1.4.16 | |
SensioLabs Symfony | =1.4.17 | |
SensioLabs Symfony | =1.4.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.