Miggo Logo

GHSA-q2gc-gg3x-7942: Symfony XML Entity Expansion security vulnerability

7.5

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
5/30/2024
Updated
5/30/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
symfony/symfonycomposer>= 2.0.0, < 2.0.172.0.17

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from XML parsing functions that didn't properly disable entity loading or use security flags like LIBXML_NONET. The commit diff shows critical additions of libxml_disable_entity_loader(true) and LIBXML_NONET flags in multiple components' XML processing logic. These functions were vulnerable because they allowed: 1) Processing of internal entities enabling quadratic blowup attacks 2) External entity processing when combined with LIBXML_NOENT 3) Document type declarations that could bypass security restrictions. The patches explicitly add entity loader disabling, LIBXML_NONET usage, and DTD prohibitions - indicating these were the vulnerable points.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Sym*ony *.*.** **rri** * [simil*r] XX* s**urity *ix, *ow*v*r, on r*vi*w o* Z** I *lso not** * vuln*r**ility to XML *ntity *xp*nsion (X**) *tt**ks w**r**y *ll *xt*nsions m*kin* us* o* li*xml* **v* no ****ns* ***inst X** Qu**r*ti* *lowup *tt**ks. T** v

Reasoning

T** vuln*r**ility st*ms *rom XML p*rsin* *un*tions t**t *i*n't prop*rly *is**l* *ntity lo**in* or us* s**urity *l**s lik* LI*XML_NON*T. T** *ommit *i** s*ows *riti**l ***itions o* li*xml_*is**l*_*ntity_lo***r(tru*) *n* LI*XML_NON*T *l**s in multipl*