CVE-2015-2308: Symfony Vulnerable to PHP Eval Injection
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.66718%
CWE
Published
5/17/2022
Updated
4/25/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
symfony/symfony | composer | >= 2.0.0, < 2.3.27 | 2.3.27 |
symfony/symfony | composer | >= 2.4.0, < 2.5.11 | 2.5.11 |
symfony/symfony | composer | >= 2.6.0, < 2.6.6 | 2.6.6 |
symfony/http-kernel | composer | >= 2.0.0, < 2.3.27 | 2.3.27 |
symfony/http-kernel | composer | >= 2.4.0, < 2.5.11 | 2.5.11 |
symfony/http-kernel | composer | >= 2.6.0, < 2.6.6 | 2.6.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the HttpCache's use of eval() to process ESI tags. The Esi::process() method was responsible for handling ESI includes and generating PHP code for evaluation. The pre-patch implementation used str_replace() with limited escaping, failing to neutralize <script language="php"> tags. This allowed attackers to inject executable PHP code via user-submitted input. The commit diff shows the fix introduced a phpEscapeMap to properly escape dangerous tags, confirming the vulnerability was in the processing logic of this method.