Information Exposure Affecting symfony/http-kernel package, versions >=2.3.0, <2.3.19>=2.1.0, <2.2.0>=2.4.0, <2.4.9>=2.5.0, <2.5.4>=2.2.0, <2.3.0>=2.0.0, <2.1.0


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-SYMFONYHTTPKERNEL-70181
  • published3 Sept 2014
  • disclosed3 Sept 2014
  • creditCédric Nirousset, Trent Steel, Christophe Coevoet

Introduced: 3 Sep 2014

CVE-2014-5245  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade symfony/http-kernel to version 2.3.19, 2.2.0, 2.4.9, 2.5.4, 2.3.0, 2.1.0 or higher.

Overview

Affected versions of symfony/http-kernel are vulnerable to Information Exposure.

When you enable the ESI feature and when you are using a proxy like Varnish that you configured as a trusted proxy, the FragmentHandler considered requests to render fragments as coming from a trusted source, even if the client was requesting them directly. Symfony can not distinguish between ESI requests done on behalf of the client by Varnish and faked fragment requests coming directly from the client.

CVSS Scores

version 3.1