Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2018-14773 | First vendor Publication | 2018-08-03 |
Vendor | Cve | Last vendor Modification | 2021-09-29 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N | |||
---|---|---|---|
Overall CVSS Score | 6.5 | ||
Base Score | 6.5 | Environmental Score | 6.5 |
impact SubScore | 3.6 | Temporal Score | 6.5 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | Low | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | High | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
An issue was discovered in Http Foundation in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. It arises from support for a (legacy) IIS header that lets users override the path in the request URL via the X-Original-URL or X-Rewrite-URL HTTP request header. These headers are designed for IIS support, but it's not verified that the server is in fact running IIS, which means anybody who can send these requests to an application can trigger this. This affects \Symfony\Component\HttpFoundation\Request::prepareRequestUri() where X-Original-URL and X_REWRITE_URL are both used. The fix drops support for these methods so that they cannot be used as attack vectors such as web cache poisoning. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14773 |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2018-09-25 | Symfony HttpFoundation component potential security bypass attempt RuleID : 47620 - Revision : 2 - Type : SERVER-WEBAPP |
2018-09-25 | Symfony HttpFoundation component potential security bypass attempt RuleID : 47619 - Revision : 3 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-732f45d43e.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-9b54497b6e.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-9c38d1dc1d.nasl - Type : ACT_GATHER_INFO |
2018-08-15 | Name : The remote Fedora host is missing a security update. File : fedora_2018-4deae442f2.nasl - Type : ACT_GATHER_INFO |
2018-08-15 | Name : The remote Fedora host is missing a security update. File : fedora_2018-6f3ceeb7cb.nasl - Type : ACT_GATHER_INFO |
2018-08-15 | Name : The remote Fedora host is missing a security update. File : fedora_2018-7f43cbdb69.nasl - Type : ACT_GATHER_INFO |
2018-08-09 | Name : A PHP application running on the remote web server is affected by a restricti... File : drupal_8_5_6.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-09-29 21:23:47 |
|
2021-05-04 13:09:02 |
|
2021-04-22 02:22:39 |
|
2020-05-23 02:11:34 |
|
2020-05-23 01:07:48 |
|
2019-10-03 09:20:53 |
|
2019-05-10 21:19:17 |
|
2019-05-10 17:18:58 |
|
2019-03-12 21:19:07 |
|
2019-03-10 21:19:44 |
|
2018-10-17 21:20:09 |
|
2018-08-03 21:19:32 |
|