Miggo Logo

CVE-2024-50345:
Symfony vulnerable to open redirect via browser-sanitized URLs

3.1

CVSS Score
3.1

Basic Information

EPSS Score
0.24074%
Published
11/6/2024
Updated
11/12/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
symfony/http-foundationcomposer< 5.4.465.4.46
symfony/http-foundationcomposer>= 6.0.0, < 6.4.146.4.14
symfony/http-foundationcomposer>= 7.0.0, < 7.1.77.1.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper URI validation in Request::create. The patch adds explicit checks for invalid characters (backslashes, CR/LF/TAB, leading/trailing control characters) as per WHATWG standards. The commit diff shows these validations were missing in vulnerable versions, making Request::create the entry point for malicious URIs. The function's role in URI parsing and the addition of validation logic in the fix confirm its vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### **s*ription T** `R*qu*st` *l*ss, *o*s not p*rs* URI wit* sp**i*l ***r**t*rs t** s*m* w*y *rows*rs *o. *s * r*sult, *n *tt**k*r **n tri*k * v*li**tor r*lyin* on t** `R*qu*st` *l*ss to r**ir**t us*rs to *not**r *om*in. ### R*solution T** `R*qu*s

Reasoning

T** vuln*r**ility st*mm** *rom improp*r URI v*li**tion in `R*qu*st::*r**t*`. T** p*t** ***s *xpli*it ****ks *or inv*li* ***r**t*rs (***ksl*s**s, *R/L*/T**, l***in*/tr*ilin* *ontrol ***r**t*rs) *s p*r W**TW* st*n**r*s. T** *ommit *i** s*ows t**s* v*li