CVE-2018-19789

MEDIUM

Symfony <4.2.1 - Info Disclosure

Title source: llm
STIX 2.1

Description

An issue was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1. When using the scalar type hint `string` in a setter method (e.g. `setName(string $name)`) of a class that's the `data_class` of a form, and when a file upload is submitted to the corresponding field instead of a normal text input, then `UploadedFile::__toString()` is called which will then return and disclose the path of the uploaded file. If combined with a local file inclusion issue in certain circumstances this could escalate it to a Remote Code Execution.

References (8)

Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/106249
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2019/dsa-4441
Mailing List mailing-list x_refsource_bugtraq
https://seclists.org/bugtraq/2019/May/21

Scores

CVSS v3 5.3
EPSS 0.0087
EPSS Percentile 75.3%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Details

CWE
CWE-434
Status published
Products (4)
debian/debian_linux 8.0
sensiolabs/symfony 2.7.0 - 2.7.50
symfony/form 2.7.0 - 2.7.50Packagist
symfony/symfony 2.7.0 - 2.7.50Packagist
Published Dec 18, 2018
Tracked Since Feb 18, 2026