Vulnerability Name: | CVE-2019-18888 (CCN-171862) | ||||||||||||||||
Assigned: | 2019-11-13 | ||||||||||||||||
Published: | 2019-11-13 | ||||||||||||||||
Updated: | 2021-07-21 | ||||||||||||||||
Summary: | An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. This is related to symfony/http-foundation (and symfony/mime in 4.3.x). | ||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-18888 Source: XF Type: UNKNOWN symfony-cve201918888-sec-bypass(171862) Source: CCN Type: symfony GIT Repository [HttpFoundation] fix guessing mime-types of files with leading dash Source: CONFIRM Type: Release Notes https://github.com/symfony/symfony/releases/tag/v4.3.8 Source: FEDORA Type: Third Party Advisory FEDORA-2019-9c2ad3b018 Source: FEDORA Type: Third Party Advisory FEDORA-2019-8b0ba02338 Source: FEDORA Type: Third Party Advisory FEDORA-2019-5ae4fd9203 Source: CCN Type: BugTraq Mailing List, Mon, 18 Nov 2019 22:04:18 +0000 [SECURITY] [DSA 4573-1] symfony security update Source: CONFIRM Type: Vendor Advisory https://symfony.com/blog/cve-2019-18888-prevent-argument-injection-in-a-mimetypeguesser Source: CONFIRM Type: Release Notes https://symfony.com/blog/symfony-4-3-8-released Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-18888 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |