CVE-2024-50343:
Symfony has an incorrect response from Validator when input ends with `\n`
3.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.29469%
CWE
Published
11/6/2024
Updated
12/13/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
symfony/symfony | composer | < 5.4.43 | 5.4.43 |
symfony/symfony | composer | >= 6.0.0, < 6.4.11 | 6.4.11 |
symfony/symfony | composer | >= 7.0.0, < 7.1.4 | 7.1.4 |
symfony/validator | composer | < 5.4.43 | 5.4.43 |
symfony/validator | composer | >= 6.0.0, < 6.4.11 | 6.4.11 |
symfony/validator | composer | >= 7.0.0, < 7.1.4 | 7.1.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from regex patterns using '$' without the 'D' modifier, which in PHP allows matching before a final newline. The commit adds 'D' to regex patterns in these validators, and test cases explicitly check for inputs ending with \n. Each listed validator class contains the regex patterns modified in the fix, confirming their role in the vulnerability. High confidence due to direct correlation between patched regex patterns and vulnerability description.