CVE-2024-50342: Symfony allows internal address and port enumeration by NoPrivateNetworkHttpClient
3.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.02523%
CWE
Published
11/6/2024
Updated
11/13/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| symfony/http-client | composer | >= 4.3.0, < 5.4.47 | 5.4.47 |
| symfony/http-client | composer | >= 6.0.0, < 6.4.15 | 6.4.15 |
| symfony/http-client | composer | >= 7.0.0, < 7.1.8 | 7.1.8 |
| symfony/symfony | composer | >= 4.3.0, < 5.4.47 | 5.4.47 |
| symfony/symfony | composer | >= 6.0.0, < 6.4.15 | 6.4.15 |
| symfony/symfony | composer | >= 7.0.0, < 7.1.8 | 7.1.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis of the patch for CVE-2024-50342 reveals that the 'request' method in 'NoPrivateNetworkHttpClient' is the key function that was modified to fix the vulnerability. The change involves filtering blocked IPs earlier in the 'on_progress' callback, which is part of the 'request' method. This indicates that the 'request' method is the primary vulnerable function.