First published: Wed Dec 19 2012(Updated: )
Code execution vulnerability via the "internal" routes
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/symfony/symfony | >=2.0.0<2.0.20>=2.1.0<2.1.5 | |
composer/symfony/symfony | >=2.1.0<2.1.5 | 2.1.5 |
composer/symfony/symfony | >=2.0.0<2.0.20 | 2.0.20 |
composer/symfony/symfony | =2.2-dev | |
Symfony | =2.0.0 | |
Symfony | =2.0.1 | |
Symfony | =2.0.2 | |
Symfony | =2.0.3 | |
Symfony | =2.0.4 | |
Symfony | =2.0.5 | |
Symfony | =2.0.6 | |
Symfony | =2.0.7 | |
Symfony | =2.0.8 | |
Symfony | =2.0.9 | |
Symfony | =2.0.10 | |
Symfony | =2.0.11 | |
Symfony | =2.0.12 | |
Symfony | =2.0.13 | |
Symfony | =2.0.14 | |
Symfony | =2.0.15 | |
Symfony | =2.0.16 | |
Symfony | =2.0.17 | |
Symfony | =2.0.18 | |
Symfony | =2.0.19 | |
Symfony | =2.0.20 | |
Symfony | =2.1.0 | |
Symfony | =2.1.1 | |
Symfony | =2.1.2 | |
Symfony | =2.1.3 | |
Symfony | =2.2-dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6432 is considered a critical vulnerability due to the potential for remote code execution.
To fix CVE-2012-6432, you should upgrade to Symfony version 2.0.20 or 2.1.5 or later.
CVE-2012-6432 affects Symfony versions 2.0.x before 2.0.20, 2.1.x before 2.1.5, and 2.2-dev.
If CVE-2012-6432 is exploited, attackers could gain access to arbitrary services through internal routes.
While upgrading is the best solution, temporarily disabling internal routes may help mitigate the risk of CVE-2012-6432.