GSD-2019-10912
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-10912",
"description": "In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge.",
"id": "GSD-2019-10912",
"references": [
"https://www.debian.org/security/2019/dsa-4441"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-10912"
],
"details": "In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge.",
"id": "GSD-2019-10912",
"modified": "2023-12-13T01:23:59.806797Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-10912",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized",
"refsource": "CONFIRM",
"url": "https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized"
},
{
"name": "FEDORA-2019-0ef4149687",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/"
},
{
"name": "FEDORA-2019-f5d6a7ce74",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/"
},
{
"name": "FEDORA-2019-2a7f472198",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/"
},
{
"name": "FEDORA-2019-8635280de5",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/"
},
{
"name": "FEDORA-2019-3ee6a7adf2",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/"
},
{
"name": "FEDORA-2019-a3ca65028c",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/"
},
{
"name": "FEDORA-2019-f8db687840",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/"
},
{
"name": "FEDORA-2019-32067d8b15",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/"
},
{
"name": "DSA-4441",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4441"
},
{
"name": "20190510 [SECURITY] [DSA 4441-1] symfony security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/May/21"
},
{
"name": "https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b",
"refsource": "CONFIRM",
"url": "https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b"
},
{
"name": "https://typo3.org/security/advisory/typo3-core-sa-2019-016/",
"refsource": "CONFIRM",
"url": "https://typo3.org/security/advisory/typo3-core-sa-2019-016/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=3.1.0,\u003c3.4.0||\u003e=4.0.0,\u003c4.2.7",
"affected_versions": "All versions starting from 3.1.0 before 3.4.0, all versions starting from 4.0.0 before 4.2.7",
"cvss_v2": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-502",
"CWE-937"
],
"date": "2019-07-12",
"description": "In Symfony it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to.",
"fixed_versions": [
"3.4.0",
"4.2.7"
],
"identifier": "CVE-2019-10912",
"identifiers": [
"CVE-2019-10912"
],
"not_impacted": "All versions before 3.1.0, all versions starting from 3.4.0 before 4.0.0, all versions starting from 4.2.7",
"package_slug": "packagist/symfony/cache",
"pubdate": "2019-05-16",
"solution": "Upgrade to versions 3.4.0, 4.2.7 or above.",
"title": "Deserialization of Untrusted Data",
"urls": [
"https://symfony.com/cve-2019-10912"
],
"uuid": "4355ff19-60a5-4c91-9efe-4d296943feaf"
},
{
"affected_range": "\u003e=2.8.0,\u003c2.8.50||\u003e=3.0.0,\u003c3.4.26||\u003e=4.0.0,\u003c4.2.7",
"affected_versions": "All versions starting from 2.8.0 before 2.8.50, all versions starting from 3.0.0 before 3.4.26, all versions starting from 4.0.0 before 4.2.7",
"cvss_v2": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-502",
"CWE-937"
],
"date": "2019-07-12",
"description": "It is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge.",
"fixed_versions": [
"2.8.50",
"3.4.26",
"4.2.7"
],
"identifier": "CVE-2019-10912",
"identifiers": [
"CVE-2019-10912"
],
"not_impacted": "All versions before 2.8.0, all versions starting from 2.8.50 before 3.0.0, all versions starting from 3.4.26 before 4.0.0, all versions starting from 4.2.7",
"package_slug": "packagist/symfony/phpunit-bridge",
"pubdate": "2019-05-16",
"solution": "Upgrade to versions 2.8.50, 3.4.26, 4.2.7 or above.",
"title": "Deserialization of Untrusted Data",
"urls": [
"https://symfony.com/cve-2019-10912"
],
"uuid": "d4ca04e7-c1d7-429d-98a4-f1ec39874632"
},
{
"affected_range": "\u003e=2.8.0,\u003c2.8.50||\u003e=3.0.0,\u003c3.4.26||\u003e=4.0.0,\u003c4.2.7",
"affected_versions": "All versions starting from 2.8.0 before 2.8.50, all versions starting from 3.0.0 before 3.4.26, all versions starting from 4.0.0 before 4.2.7",
"cvss_v2": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-502",
"CWE-937"
],
"date": "2019-07-12",
"description": "In Symfony it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to.",
"fixed_versions": [
"2.8.50",
"3.4.26",
"4.2.7"
],
"identifier": "CVE-2019-10912",
"identifiers": [
"CVE-2019-10912"
],
"not_impacted": "All versions before 2.8.0, all versions starting from 2.8.50 before 3.0.0, all versions starting from 3.4.26 before 4.0.0, all versions starting from 4.2.7",
"package_slug": "packagist/symfony/symfony",
"pubdate": "2019-05-16",
"solution": "Upgrade to versions 2.8.50, 3.4.26, 4.2.7 or above.",
"title": "Deserialization of Untrusted Data",
"urls": [
"https://symfony.com/cve-2019-10912"
],
"uuid": "e1cbf82d-89c6-473a-9359-91ad1ad072cb"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.2.7",
"versionStartIncluding": "4.2.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.1.12",
"versionStartIncluding": "4.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.4.26",
"versionStartIncluding": "3.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.8.50",
"versionStartIncluding": "2.8.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-10912"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized"
},
{
"name": "https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b"
},
{
"name": "FEDORA-2019-2a7f472198",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/"
},
{
"name": "20190510 [SECURITY] [DSA 4441-1] symfony security update",
"refsource": "BUGTRAQ",
"tags": [],
"url": "https://seclists.org/bugtraq/2019/May/21"
},
{
"name": "FEDORA-2019-32067d8b15",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/"
},
{
"name": "FEDORA-2019-3ee6a7adf2",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/"
},
{
"name": "DSA-4441",
"refsource": "DEBIAN",
"tags": [],
"url": "https://www.debian.org/security/2019/dsa-4441"
},
{
"name": "FEDORA-2019-0ef4149687",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/"
},
{
"name": "FEDORA-2019-f5d6a7ce74",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/"
},
{
"name": "FEDORA-2019-a3ca65028c",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/"
},
{
"name": "FEDORA-2019-f8db687840",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/"
},
{
"name": "https://typo3.org/security/advisory/typo3-core-sa-2019-016/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://typo3.org/security/advisory/typo3-core-sa-2019-016/"
},
{
"name": "FEDORA-2019-8635280de5",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
},
"lastModifiedDate": "2019-07-12T14:15Z",
"publishedDate": "2019-05-16T22:29Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…