Miggo Logo

CVE-2024-50343:
Symfony has an incorrect response from Validator when input ends with `\n`

3.1

CVSS Score
3.1

Basic Information

EPSS Score
0.29469%
Published
11/6/2024
Updated
12/13/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
symfony/symfonycomposer< 5.4.435.4.43
symfony/symfonycomposer>= 6.0.0, < 6.4.116.4.11
symfony/symfonycomposer>= 7.0.0, < 7.1.47.1.4
symfony/validatorcomposer< 5.4.435.4.43
symfony/validatorcomposer>= 6.0.0, < 6.4.116.4.11
symfony/validatorcomposer>= 7.0.0, < 7.1.47.1.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from regex patterns using '$' without the 'D' modifier, which in PHP allows matching before a final newline. The commit adds 'D' to regex patterns in these validators, and test cases explicitly check for inputs ending with \n. Each listed validator class contains the regex patterns modified in the fix, confirming their role in the vulnerability. High confidence due to direct correlation between patched regex patterns and vulnerability description.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### **s*ription It is possi*l* to tri*k * `V*li**tor` *on*i*ur** wit* * r**ul*r *xpr*ssion usin* t** `$` m*t****r**t*rs, wit* *n input *n*in* wit* `\n`. ### R*solution Sym*ony now us*s t** `*` r***x mo*i*i*r to m*t** t** *ntir* input. T** p*t** *

Reasoning

T** vuln*r**ility st*ms *rom r***x p*tt*rns usin* '$' wit*out t** '*' mo*i*i*r, w*i** in P*P *llows m*t**in* ***or* * *in*l n*wlin*. T** *ommit ***s '*' to r***x p*tt*rns in t**s* v*li**tors, *n* t*st **s*s *xpli*itly ****k *or inputs *n*in* wit* \n.