First published: Sat Oct 09 2021(Updated: )
CVE-2021-41267: Webcache Poisoning via X-Forwarded-Prefix and sub-request
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/symfony/http-kernel | >=5.2.0<5.3.0>=5.3.0<5.3.12 | |
composer/symfony/symfony | >=5.2.0<5.3.0>=5.3.0<5.3.12 | |
SensioLabs Symfony | >=5.2.0<5.3.12 | |
composer/symfony/symfony | >=5.2.0<5.3.12 | 5.3.12 |
composer/symfony/http-kernel | >=5.2.0<5.3.12 | 5.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41267 is a vulnerability that allows web cache poisoning through the X-Forwarded-Prefix header and sub-requests.
CVE-2021-41267 affects the Symfony HttpKernel library version 5.2.0 up to 5.3.12.
To fix CVE-2021-41267, it is recommended to upgrade the affected Symfony HttpKernel library to version 5.3.13 or higher.
You can find more information about CVE-2021-41267 on the Symfony website at https://symfony.com/cve-2021-41267.