First published: Wed Sep 02 2020(Updated: )
CVE-2020-15094: Prevent RCE when calling untrusted remote with CachingHttpClient
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/symfony/http-kernel | >=4.3.0<4.4.0>=4.4.0<4.4.13>=5.0.0<5.1.0>=5.1.0<5.1.5 | |
composer/symfony/symfony | >=4.3.0<4.4.0>=4.4.0<4.4.13>=5.0.0<5.1.0>=5.1.0<5.1.5 | |
Sensiolabs Httpclient | >=4.4.0<4.4.13 | |
Sensiolabs Httpclient | >=5.1.0<5.1.5 | |
SensioLabs Symfony | >=4.4.0<4.4.13 | |
SensioLabs Symfony | >=5.1.0<5.1.5 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
composer/symfony/symfony | >=4.3.0<4.4.13 | 4.4.13 |
composer/symfony/http-kernel | >=4.3.0<4.4.13 | 4.4.13 |
composer/symfony/symfony | >=5.0.0<5.1.5 | 5.1.5 |
composer/symfony/http-kernel | >=5.0.0<5.1.5 | 5.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15094 is a vulnerability in the Symfony HttpClient component that allows remote code execution (RCE) when calling an untrusted remote.
CVE-2020-15094 has a severity value of 8.8, which is considered high.
The affected software packages include Symfony HttpKernel and Symfony HttpClient versions 4.3.0 up to 4.4.13, and versions 5.0.0 up to 5.1.5. It also affects Sensiolabs Httpclient versions 4.4.0 up to 4.4.13 and versions 5.1.0 up to 5.1.5, as well as Sensiolabs Symfony versions 4.4.0 up to 4.4.13 and versions 5.1.0 up to 5.1.5.
The CachingHttpClient class in Symfony relies on the HttpCache class to handle requests.
The HttpCache class uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses.