Information Exposure Affecting sylius/sylius package, versions >=1.5.0, <1.5.1>=1.6.0, <1.6.3>=1.4.0, <1.4.5>=1.3.0, <1.3.12<1.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (33rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-SYLIUSSYLIUS-543315
  • published27 Jan 2020
  • disclosed27 Jan 2020
  • creditUnknown

Introduced: 27 Jan 2020

CVE-2020-5220  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade sylius/sylius to version 1.5.1, 1.6.3, 1.4.5, 1.3.12, 1.3 or higher.

Overview

sylius/sylius is a platform for PHP, based on Symfony framework.

Affected versions of this package are vulnerable to Information Exposure. ResourceBundle accepts and uses any serialisation groups to be passed via a HTTP header. This might lead to data exposure by using an unintended serialisation group - for example it could make Shop API use a more permissive group from Admin API.

References

CVSS Scores

version 3.1