Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-10909 PoC — Sensio Labs Symfony 跨站脚本漏洞

Source
Associated Vulnerability
Title:Sensio Labs Symfony 跨站脚本漏洞 (CVE-2019-10909)
Description:Sensio Labs Symfony是法国Sensio Labs公司的一套免费的、基于MVC架构的PHP开发框架。该框架提供常用的功能组件及工具,可用于快速创建复杂的WEB程序。 Sensio Labs Symfony中存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。以下产品及版本受到影响:Sensio Labs Symfony 2.7.51之前版本,2.8.50之前的2.8.x版本,3.4.26之前的3.x版本,4.1.12之前的4.x版本,4.2.
Description
 CVE-2021-21424 - CRLF Injection - CVE-2021-41268 - Host Header Injection - CVE-2022-24894 - WebProfiler abierto - CVE-2019-10909 - Directory Traversal
Readme
# Symfony Vulnerability Scanner

Herramienta de escaneo automatizado para detectar múltiples vulnerabilidades conocidas (CVE) en aplicaciones Symfony expuestas a Internet.

Desarrollado por **m10sec**.

---

## 🚀 Características

- Detección de múltiples CVEs en Symfony:
  - [CVE-2021-21424](https://nvd.nist.gov/vuln/detail/CVE-2021-21424) – CRLF Injection
  - [CVE-2021-41268](https://nvd.nist.gov/vuln/detail/CVE-2021-41268) – Host Header Injection
  - [CVE-2022-24894](https://nvd.nist.gov/vuln/detail/CVE-2022-24894) – WebProfiler expuesto
  - [CVE-2019-10909](https://nvd.nist.gov/vuln/detail/CVE-2019-10909) – Path Traversal
- Pruebas individuales o escaneo completo
- Validación real de contenido sensible (ej. `/etc/passwd`)
- Uso de `socket` para bypass en CRLF Injection
- Código limpio y fácilmente ampliable

---

## 🧠 Requisitos

- Python 3.7 o superior
- Librerías:
  - `requests` (instalable con `pip install requests`)

---

## 📦 Instalación

```bash
git clone https://github.com/tuusuario/symfony-vuln-scanner.git
cd symfony-vuln-scanner
pip install -r requirements.txt
python3 scanner.py
File Snapshot

[4.0K] /data/pocs/ad0600c50919375ba6dcead67b3ce3cdd267270e ├── [1.1K] README.md └── [3.9K] Symfony CVE Scanner PoC.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.