| Vulnerability Name: | CVE-2017-16654 (CCN-148237) | ||||||||||||||||||||||||||||||||
| Assigned: | 2017-11-17 | ||||||||||||||||||||||||||||||||
| Published: | 2017-11-17 | ||||||||||||||||||||||||||||||||
| Updated: | 2019-03-13 | ||||||||||||||||||||||||||||||||
| Summary: | An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal. | ||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-22 | ||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-16654 Source: XF Type: UNKNOWN symfony-cve201716654-dir-traversal(148237) Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://github.com/symfony/symfony/pull/24994 Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20190310 [SECURITY] [DLA 1707-1] symfony security update Source: CCN Type: Symfony blog, November 17, 2017 CVE-2017-16654: Intl bundle readers breaking out of paths Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-out-of-paths Source: DEBIAN Type: Third Party Advisory DSA-4262 | ||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||