Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. When a form is submitted by the user, the request handler classes of the Form component merge POST data and uploaded files data into one array. This big array forms the data that are then bound to the form. At this stage there is no difference anymore between submitted POST data and uploaded files. A user can send a crafted HTTP request where the value of a "FileType" is sent as normal POST data that could be interpreted as a local file path on the server-side (for example, "file:///etc/passwd"). If the application did not perform any additional checks about the value submitted to the "FileType", the contents of the given file on the server could have been exposed to the attacker.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Sensio Labs Symfony 安全漏洞
Vulnerability Description
Sensio Labs Symfony是法国Sensio Labs公司的一套免费的、基于MVC架构的PHP开发框架。该框架提供常用的功能组件及工具,可用于快速创建复杂的WEB程序。 Sensio Labs Symfony中存在安全漏洞。攻击者可通过发送特制的HTTP请求利用该漏洞获取服务器上的文件内容。以下版本受到影响:Sensio Labs Symfony 2.7.38之前版本,2.8.31版本,3.2.14版本,3.3.13版本,3.4-BETA5版本,4.0-BETA5版本。
CVSS Information
N/A
Vulnerability Type
N/A