Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-15094


In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by CachingHttpClient and if an attacker can control the response for a request being made by the CachingHttpClient, remote code execution is possible. This has been fixed in versions 4.4.13 and 5.1.5.


Published

2020-09-02T18:15:11.187

Last Modified

2024-11-21T05:04:47.703

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.0 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-212

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sensiolabs httpclient < 4.4.13 Yes
Application sensiolabs httpclient < 5.1.5 Yes
Application sensiolabs symfony < 4.4.13 Yes
Application sensiolabs symfony < 5.1.5 Yes
Operating System fedoraproject fedora 32 Yes
Operating System fedoraproject fedora 33 Yes

References