An issue was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1. When using the scalar type hint `string` in a setter method (e.g. `setName(string $name)`) of a class that's the `data_class` of a form, and when a file upload is submitted to the corresponding field instead of a normal text input, then `UploadedFile::__toString()` is called which will then return and disclose the path of the uploaded file. If combined with a local file inclusion issue in certain circumstances this could escalate it to a Remote Code Execution.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2018-12-18 22:29
Updated : 2023-11-07 02:55
NVD link : CVE-2018-19789
Mitre link : CVE-2018-19789
CVE.ORG link : CVE-2018-19789
JSON object : View
Products Affected
debian
- debian_linux
sensiolabs
- symfony
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type