CSV Injection Affecting symfony/symfony package, versions >=5.0.0, <5.3.12>=4.1.0, <4.4.35


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.13% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-SYMFONYSYMFONY-1925886
  • published24 Nov 2021
  • disclosed24 Nov 2021
  • creditJake Barwell, Jérémy Derussé

Introduced: 24 Nov 2021

CVE-2021-41270  (opens in a new tab)
CWE-1236  (opens in a new tab)

How to fix?

Upgrade symfony/symfony to version 5.3.12, 4.4.35 or higher.

Overview

symfony/symfony is a PHP framework for web applications and a set of reusable PHP components.

Affected versions of this package are vulnerable to CSV Injection via prefixing cells with \t, \r, =, +, - or @ which are all interpreted as special characters for this package. An attacker could leverage this to cause a vulnerable application to execute malicious behaviours when consuming such a crafted CSV file.

CVSS Scores

version 3.1