First published: Wed Nov 06 2024(Updated: )
### Description When using the `NoPrivateNetworkHttpClient`, some internal information is still leaking during host resolution, which leads to possible IP/port enumeration. ### Resolution The `NoPrivateNetworkHttpClient` now filters blocked IPs earlier to prevent such leaks. The fisrt patch for this issue is available [here](https://github.com/symfony/symfony/commit/296d4b34a33b1a6ca5475c6040b3203622520f5b) for branch 5.4. The second one is available [here](https://github.com/symfony/symfony/commit/b4bf5afdbdcb2fd03da513ee03beeabeb551e5fa) for branch 5.4 also. ### Credits We would like to thank Linus Karlsson and Chris Smith for reporting the issue and Nicolas Grekas for providing the fix.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/symfony/symfony | >=7.0.0<7.1.8 | 7.1.8 |
composer/symfony/symfony | >=6.0.0<6.4.15 | 6.4.15 |
composer/symfony/symfony | >=4.3.0<5.4.47 | 5.4.47 |
composer/symfony/http-client | >=7.0.0<7.1.8 | 7.1.8 |
composer/symfony/http-client | >=6.0.0<6.4.15 | 6.4.15 |
composer/symfony/http-client | >=4.3.0<5.4.47 | 5.4.47 |
debian/symfony | <=4.4.19+dfsg-2+deb11u6 | 5.4.23+dfsg-1+deb12u4 6.4.18+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50342 has been classified as a moderate severity vulnerability due to the potential for IP/port enumeration.
To fix CVE-2024-50342, update your Symfony package to version 7.1.8, 6.4.15, or 5.4.47.
CVE-2024-50342 affects Symfony versions from 5.4.0 to 5.4.46, 6.0.0 to 6.4.14, and 7.0.0 to 7.1.7.
CVE-2024-50342 arises from improper handling of internal information by the NoPrivateNetworkHttpClient during host resolution.
There is no official workaround for CVE-2024-50342; the recommended action is to upgrade to a patched version.