[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3276-1 symfony -- symfony

ID: oval:org.secpod.oval:def:602127Date: (C)2015-06-04   (M)2022-09-22
Class: PATCHFamily: unix




Jakub Zalas discovered that Symfony, a framework to create websites and web applications, was vulnerable to restriction bypass. It was affecting applications with ESI or SSI support enabled, that use the FragmentListener. A malicious user could call any controller via the /_fragment path by providing an invalid hash in the URL , bypassing URL signing and security rules.

Platform:
Debian 8.x
Product:
php-symfony
Reference:
DSA-3276-1
CVE-2015-4050
CVE    1
CVE-2015-4050
CPE    2
cpe:/a:symfony:php-symfony
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies