CVE-2019-18888

HIGH

Symfony <4.3.8 - Command Injection

Title source: llm

Description

An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. This is related to symfony/http-foundation (and symfony/mime in 4.3.x).

Scores

CVSS v3 7.5
EPSS 0.0274
EPSS Percentile 85.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Classification

CWE
CWE-88
Status published

Affected Products (6)

sensiolabs/symfony < 2.8.50
fedoraproject/fedora
fedoraproject/fedora
symfony/http-foundation < 2.8.52Packagist
symfony/mime < 4.3.8Packagist
symfony/symfony < 2.8.52Packagist

Timeline

Published Nov 21, 2019
Tracked Since Feb 18, 2026