Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Titlesymfony security update
Informations
NameDSA-4441First vendor Publication2019-05-10
VendorDebianLast vendor Modification2019-05-10
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple vulnerabilities were discovered in the Symfony PHP framework which could lead to cache bypass, authentication bypass, information disclosure, open redirect, cross-site request forgery, deletion of arbitrary files, or arbitrary code execution.

For the stable distribution (stretch), these problems have been fixed in version 2.8.7+dfsg-1.3+deb9u2.

We recommend that you upgrade your symfony packages.

For the detailed security status of symfony please refer to its security tracker page at: https://security-tracker.debian.org/tracker/symfony

Original Source

Url : http://www.debian.org/security/2019/dsa-4441

CWE : Common Weakness Enumeration

%idName
25 %CWE-89Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)
12 %CWE-601URL Redirection to Untrusted Site ('Open Redirect') (CWE/SANS Top 25)
12 %CWE-502Deserialization of Untrusted Data
12 %CWE-434Unrestricted Upload of File with Dangerous Type (CWE/SANS Top 25)
12 %CWE-287Improper Authentication
12 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
12 %CWE-19Data Handling

CPE : Common Platform Enumeration

TypeDescriptionCount
Application345
Application204
Os1
Os1

Snort® IPS/IDS

DateDescription
2018-09-25Symfony HttpFoundation component potential security bypass attempt
RuleID : 47620 - Revision : 2 - Type : SERVER-WEBAPP
2018-09-25Symfony HttpFoundation component potential security bypass attempt
RuleID : 47619 - Revision : 3 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

DateDescription
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-9b54497b6e.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-9c38d1dc1d.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-b38a4dd0c7.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-66547a8c14.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-6edf04d9d6.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-732f45d43e.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-84a1f77d89.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-8c06b6defd.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-8d3a9bdff1.nasl - Type : ACT_GATHER_INFO
2018-08-15Name : The remote Fedora host is missing a security update.
File : fedora_2018-4deae442f2.nasl - Type : ACT_GATHER_INFO
2018-08-15Name : The remote Fedora host is missing a security update.
File : fedora_2018-6f3ceeb7cb.nasl - Type : ACT_GATHER_INFO
2018-08-15Name : The remote Fedora host is missing a security update.
File : fedora_2018-7f43cbdb69.nasl - Type : ACT_GATHER_INFO
2018-08-09Name : A PHP application running on the remote web server is affected by a restricti...
File : drupal_8_5_6.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-07-12 21:22:06
  • Multiple Updates
2019-05-10 09:18:18
  • First insertion