GSD-2017-18343

Vulnerability from gsd - Updated: 2023-12-13 01:21
Details
** DISPUTED ** The debug handler in Symfony before v2.7.33, 2.8.x before v2.8.26, 3.x before v3.2.13, and 3.3.x before v3.3.6 has XSS via an array key during exception pretty printing in ExceptionHandler.php, as demonstrated by a /_debugbar/open?op=get URI. NOTE: the vendor's position is that this is not a vulnerability because the debug tools are not intended for production use. NOTE: the Symfony Debug component is used by Laravel Debugbar.
Aliases
Aliases

{
  "GSD": {
    "alias": "CVE-2017-18343",
    "description": "** DISPUTED ** The debug handler in Symfony before v2.7.33, 2.8.x before v2.8.26, 3.x before v3.2.13, and 3.3.x before v3.3.6 has XSS via an array key during exception pretty printing in ExceptionHandler.php, as demonstrated by a /_debugbar/open?op=get URI. NOTE: the vendor\u0027s position is that this is not a vulnerability because the debug tools are not intended for production use. NOTE: the Symfony Debug component is used by Laravel Debugbar.",
    "id": "GSD-2017-18343"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2017-18343"
      ],
      "details": "** DISPUTED ** The debug handler in Symfony before v2.7.33, 2.8.x before v2.8.26, 3.x before v3.2.13, and 3.3.x before v3.3.6 has XSS via an array key during exception pretty printing in ExceptionHandler.php, as demonstrated by a /_debugbar/open?op=get URI. NOTE: the vendor\u0027s position is that this is not a vulnerability because the debug tools are not intended for production use. NOTE: the Symfony Debug component is used by Laravel Debugbar.",
      "id": "GSD-2017-18343",
      "modified": "2023-12-13T01:21:10.960326Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2017-18343",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "** DISPUTED ** The debug handler in Symfony before v2.7.33, 2.8.x before v2.8.26, 3.x before v3.2.13, and 3.3.x before v3.3.6 has XSS via an array key during exception pretty printing in ExceptionHandler.php, as demonstrated by a /_debugbar/open?op=get URI. NOTE: the vendor\u0027s position is that this is not a vulnerability because the debug tools are not intended for production use. NOTE: the Symfony Debug component is used by Laravel Debugbar."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://github.com/symfony/symfony/pull/23684",
            "refsource": "MISC",
            "url": "https://github.com/symfony/symfony/pull/23684"
          },
          {
            "name": "https://github.com/symfony/debug/pull/7/commits/e48bda29143bd1a83001780b4a78e483822d985c",
            "refsource": "MISC",
            "url": "https://github.com/symfony/debug/pull/7/commits/e48bda29143bd1a83001780b4a78e483822d985c"
          },
          {
            "name": "https://github.com/symfony/symfony/issues/27987",
            "refsource": "MISC",
            "url": "https://github.com/symfony/symfony/issues/27987"
          },
          {
            "name": "https://github.com/barryvdh/laravel-debugbar/issues/850",
            "refsource": "MISC",
            "url": "https://github.com/barryvdh/laravel-debugbar/issues/850"
          }
        ]
      }
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003c2.7.33||\u003e=2.8.0,\u003c2.8.26||\u003e=3.0.0,\u003c3.2.13||\u003e=3.3.0,\u003c3.3.6",
          "affected_versions": "All versions before 2.7.33, all versions starting from 2.8.0 before 2.8.26, all versions starting from 3.0.0 before 3.2.13, all versions starting from 3.3.0 before 3.3.6",
          "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "cwe_ids": [
            "CWE-1035",
            "CWE-79",
            "CWE-937"
          ],
          "date": "2018-09-18",
          "description": "The debug handler in Symfony has an XSS via an array key during exception pretty printing in `ExceptionHandler.php`, as demonstrated by a `/_debugbar/open?op`=get` URI.",
          "fixed_versions": [
            "2.7.33",
            "2.8.26",
            "3.2.13",
            "3.3.6"
          ],
          "identifier": "CVE-2017-18343",
          "identifiers": [
            "CVE-2017-18343"
          ],
          "not_impacted": "All versions starting from 2.7.33 before 2.8.0, all versions starting from 2.8.26 before 3.0.0, all versions starting from 3.2.13 before 3.3.0, all versions starting from 3.3.6",
          "package_slug": "packagist/symfony/symfony",
          "pubdate": "2018-07-20",
          "solution": "Upgrade to versions 2.7.33, 2.8.26, 3.2.13, 3.3.6 or above.",
          "title": "Cross-site Scripting",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2017-18343"
          ],
          "uuid": "be8f84a1-5b9f-4961-855d-2be362f5c571"
        }
      ]
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FFE043B4-4689-4BC1-86B0-4BB00B545D6E",
                    "versionEndExcluding": "2.7.33",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EAC436C0-4E79-45BD-9B31-2DD8A42E2427",
                    "versionEndExcluding": "2.8.26",
                    "versionStartIncluding": "2.8.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2CD89B10-CD20-4BEF-ABEE-8C2248B55BC9",
                    "versionEndExcluding": "3.2.13",
                    "versionStartIncluding": "3.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "59558D75-9E6C-4C41-852C-E6E78C50B9CD",
                    "versionEndExcluding": "3.3.6",
                    "versionStartIncluding": "3.3.0",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "The debug handler in Symfony before v2.7.33, 2.8.x before v2.8.26, 3.x before v3.2.13, and 3.3.x before v3.3.6 has XSS via an array key during exception pretty printing in ExceptionHandler.php, as demonstrated by a /_debugbar/open?op=get URI. NOTE: the vendor\u0027s position is that this is not a vulnerability because the debug tools are not intended for production use. NOTE: the Symfony Debug component is used by Laravel Debugbar"
          },
          {
            "lang": "es",
            "value": "** EN DISPUTA ** El manipulador de depuraci\u00f3n en Symfony, en versiones anteriores a la v2.7.33, versiones 2.8.x anteriores a la v2.8.26, versiones 3.x anteriores a la v3.2.13 y versiones 3.3.x anteriores a la v3.3.6, tiene Cross-Site Scripting (XSS) mediante una clave de array durante la impresi\u00f3n de excepciones pretty en ExceptionHandler.php, tal y como queda demostrado con un URI /_debugbar/open?op=get. NOTA: el fabricante sostiene que esta no es una vulnerabilidad debido a que las herramientas de depuraci\u00f3n no est\u00e1n dise\u00f1adas para ser empleadas en producci\u00f3n. NOTA: el componente Symfony Debug es empleado por Laravel Debugbar."
          }
        ],
        "id": "CVE-2017-18343",
        "lastModified": "2024-04-11T00:58:06.797",
        "metrics": {
          "cvssMetricV2": [
            {
              "acInsufInfo": false,
              "baseSeverity": "MEDIUM",
              "cvssData": {
                "accessComplexity": "MEDIUM",
                "accessVector": "NETWORK",
                "authentication": "NONE",
                "availabilityImpact": "NONE",
                "baseScore": 4.3,
                "confidentialityImpact": "NONE",
                "integrityImpact": "PARTIAL",
                "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
                "version": "2.0"
              },
              "exploitabilityScore": 8.6,
              "impactScore": 2.9,
              "obtainAllPrivilege": false,
              "obtainOtherPrivilege": false,
              "obtainUserPrivilege": false,
              "source": "nvd@nist.gov",
              "type": "Primary",
              "userInteractionRequired": true
            }
          ],
          "cvssMetricV30": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "NONE",
                "baseScore": 6.1,
                "baseSeverity": "MEDIUM",
                "confidentialityImpact": "LOW",
                "integrityImpact": "LOW",
                "privilegesRequired": "NONE",
                "scope": "CHANGED",
                "userInteraction": "REQUIRED",
                "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                "version": "3.0"
              },
              "exploitabilityScore": 2.8,
              "impactScore": 2.7,
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        },
        "published": "2018-07-20T00:29:00.237",
        "references": [
          {
            "source": "cve@mitre.org",
            "tags": [
              "Exploit",
              "Third Party Advisory"
            ],
            "url": "https://github.com/barryvdh/laravel-debugbar/issues/850"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Patch",
              "Third Party Advisory"
            ],
            "url": "https://github.com/symfony/debug/pull/7/commits/e48bda29143bd1a83001780b4a78e483822d985c"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Exploit",
              "Third Party Advisory"
            ],
            "url": "https://github.com/symfony/symfony/issues/27987"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://github.com/symfony/symfony/pull/23684"
          }
        ],
        "sourceIdentifier": "cve@mitre.org",
        "vulnStatus": "Modified",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-79"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…