Miggo Logo

GHSA-hx53-jchx-cr52: Symfony2 improper IP based access control

5.9

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
5/30/2024
Updated
5/30/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
symfony/symfonycomposer>= 2.0.0, < 2.0.192.0.19
symfony/symfonycomposer>= 2.1.0, < 2.1.42.1.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from using trustProxyData() which automatically trusts the immediate proxy (REMOTE_ADDR) without validation. When combined with getClientIp(), this allows attackers to spoof X-Forwarded-For headers if the application isn't behind a properly configured trusted proxy. The security patches replace trustProxyData() with setTrustedProxies() requiring explicit proxy IPs, confirming these functions' role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**mi*n Tournou*, *rom t** *rup*l s**urity t**m, *ont**t** us two **ys **o **out * s**urity issu* in t** R*qu*st::**t*li*ntIp() m*t*o* w**n t** trust proxy mo** is *n**l** (R*qu*st::trustProxy**t*()). *n *ppli**tion is vuln*r**l* i* it us*s t** *li*n

Reasoning

T** vuln*r**ility st*ms *rom usin* `trustProxy**t*()` w*i** *utom*ti**lly trusts t** imm**i*t* proxy (R*MOT*_***R) wit*out v*li**tion. W**n *om*in** wit* `**t*li*ntIp()`, t*is *llows *tt**k*rs to spoo* X-*orw*r***-*or *****rs i* t** *ppli**tion isn't