CVE-2024-50345:
Symfony vulnerable to open redirect via browser-sanitized URLs
3.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.24074%
CWE
Published
11/6/2024
Updated
11/12/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
symfony/http-foundation | composer | < 5.4.46 | 5.4.46 |
symfony/http-foundation | composer | >= 6.0.0, < 6.4.14 | 6.4.14 |
symfony/http-foundation | composer | >= 7.0.0, < 7.1.7 | 7.1.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper URI validation in Request::create
. The patch adds explicit checks for invalid characters (backslashes, CR/LF/TAB, leading/trailing control characters) as per WHATWG standards. The commit diff shows these validations were missing in vulnerable versions, making Request::create
the entry point for malicious URIs. The function's role in URI parsing and the addition of validation
logic in the fix confirm its vulnerability.