Symfony: 8 new security vulnerabilities discovered - Analysis and recommendations

After a flawless year, Symfony unveiled this November 6, 2024 on its blog eight vulnerabilities at once. They affect different versions of the Symfony framework. Here's a summary of these critical vulnerabilities, their potential impact, and the solutions implemented by Symfony. It will help you understand the implications of these vulnerabilities for securing your applications.

Introduction

Even the most renowned frameworks, such as Symfony, are never immune to security flaws. Whatever application solution you choose, you need to be vigilant. Safeguards such as a ModSecurity application firewall and automatic attacker blocking (fail2ban), combined with a good outsourced backup policy, are essential.

On LRob secure web hosting, our Linux servers support your application security with ModSecurity combined with fail2ban actively blocking attempts to exploit vulnerabilities; full outsourced backups are made daily with a one-year retention period. Choose LRob as your hosting provider, is to benefit from a simple, secure hosting solution while adding a rigorous, available and passionate sysadmin to your team!

Symfony security holes (November 2024)

CVE-2024-51736: Hijacking command execution on Windows with the Process class

Versions concerned
Symfony versions =6, =7, <7.1.7.

Description
This flaw enables execution to be diverted on Windows systems when the executable file cmd.exe is in the current working directory. The class Process could then execute this file, paving the way for malicious hijacking.

Resolution
Symfony has corrected this problem by forcing the Process to use the absolute path to cmd.exe.

See the official Symfony article.


CVE-2024-50341 : Security::login method ignores custom user_checker

Versions concerned
Symfony versions >=6.2, =7.0, =7.1, <7.1.3.

Description
The method Security::login Symfony did not take into account the user_checker which could lead to unwanted connections.

Resolution
The patch now implements a call to the user_checker configured.

See the official Symfony article.


CVE-2024-50340 : Change environment via a request

Versions concerned
Symfony versions =6, =7, <7.1.7.

Description
By manipulating a specific query string, users can change the kernel environment or debug mode when a PHP register_argc_argv is activated.

Resolution
The component SymfonyRuntime now ignores argv values for non-CLI environments.

See the official Symfony article.


CVE-2024-50342: Enumeration of internal addresses and ports via NoPrivateNetworkHttpClient

Versions concerned
Symfony versions =6, =7, <7.1.7.

Description
With NoPrivateNetworkHttpClientsome internal information could still be exposed, enabling the enumeration of IP addresses and ports.

Resolution
The customer NoPrivateNetworkHttpClient now applies blocked IP filtering from the start of host resolution.

See the official Symfony article.


CVE-2024-50343 : Incorrect Validator response with input ending in \n

Versions concerned
Symfony versions =6, =7, <7.1.4.

Description
Validation using a regular expression could be bypassed by inserting a \n at the end of the input, resulting in an incorrect response from the Validator.

Resolution
Symfony now uses the regex modifier D to guarantee validation of the entire input.

See the official Symfony article.


CVE-2024-50345: Open redirection via browser-sanitized URLs

Versions concerned
Symfony versions =6, =7, <7.1.7.

Description
By exploiting special characters in a URL, an attacker could hijack a redirect based on the class Request to send users to another domain.

Resolution
The method Request::create now checks URIs for invalid characters.

See the official Symfony article.

Twig CVE-2024-51754: Unprotected calls to __toString() in a sandbox

Versions concerned
Twig versions =3.12, <3.14.1.

Description
In a sandbox environment, an attacker could call the __toString() of an object, even if this method was not authorized by the security policy, opening the door to a circumvention of sandbox restrictions.

Resolution
Sandbox mode now systematically checks the call to __toString() on all objects.

See the official Symfony article.


Twig CVE-2024-51755: Unprotected calls to __isset() and Array object accesses in a sandbox

Versions concerned
Twig versions =3.12, <3.14.1.

Description
In a sandbox environment, array-like objects could expose attributes without security checks. This allowed an attacker to access potentially sensitive properties.

Resolution
Sandbox mode now controls the properties of Array objects and the call to __isset() after safety check.

See the official Symfony article.


Conclusion and recommendations from LRob

These eight flaws show that even the most robust frameworks like Symfony are not immune to security vulnerabilities. Fortunately, the Symfony team reacted quickly to provide patches. And as it should be, the vulnerabilities were only made public after they had been patched. If you're using Symfony, make sure you update as soon as possible to protect your applications and your users.

Never forget that no software solution is free from security flaws. Your vigilance must be continuous, and regular updates remain the best line of defense against security flaws and cyberthreats.

At LRob, our servers offer optimal security:

  • No Windows vulnerability : As our servers run on Linux, they are not affected by Windows-specific vulnerabilities.
  • Server application update Server software is updated daily and monitored 24/7.
  • ModSecurity firewall : By actively filtering malicious requests, our firewall protects your applications.
  • Outsourced backups : We have daily outsourced backups to facilitate data recovery in the event of an incident, and you can also make your own backups to the FTP of your choice (e.g. via a VPS Storage Cloud from PulseHeberg) via Plesk.

2 responses to "Symfony: 8 new security vulnerabilities discovered - Analysis and recommendations”

  1. Avatar Stone
    Pierre

    Thank you very much for your unfailing monitoring of Cybersecurity news! 👍

    I learn something new every time I read you here or on your LinkedIn. 😅

    Pierre

    1. Thanks for your feedback! Happy to help!

Leave a Reply

Your email address will not be published. Required fields are marked *

Categories

Web hosting

Succeed on the web

Safety, performance, simplicity.
The best tools to serve you.

Nextcloud hosting

Nextcloud

The best free collaborative suite

Maintenance included

Webmaster WordPress Specialist

WordPress website management

Webmaster WordPress specialist in Orleans

Entrust your site to a WordPress security and maintenance expert

en_US