CVE-2024-50340

symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.3 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
GitHub_MCNA
7.3 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Debian logo
Debian Releases
Debian Product
Codename
symfony
bullseye
vulnerable
bookworm
5.4.23+dfsg-1+deb12u4
fixed
bookworm (security)
5.4.23+dfsg-1+deb12u4
fixed
sid
6.4.21+dfsg-2
fixed
trixie
6.4.21+dfsg-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
symfony
plucky
needs-triage
oracular
needs-triage
noble
Fixed 6.4.5+dfsg-3ubuntu3+esm1
released
jammy
Fixed 5.4.4+dfsg-1ubuntu8+esm1
released
focal
needs-triage
bionic
not-affected
xenial
not-affected