Arbitrary Code Injection Affecting symfony package, versions <5.4.23+dfsg-1+deb12u3


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-SYMFONY-8352890
  • published8 Nov 2024
  • disclosed6 Nov 2024

Introduced: 6 Nov 2024

CVE-2024-50340  (opens in a new tab)
CWE-74  (opens in a new tab)

How to fix?

Upgrade Debian:12 symfony to version 5.4.23+dfsg-1+deb12u3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream symfony package and not the symfony package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the register_argv_argc php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the SymfonyRuntime now ignores the argv values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability.