{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-50340","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-10-22T17:54:40.955Z","datePublished":"2024-11-06T21:09:46.750Z","dateUpdated":"2024-11-07T15:29:50.292Z"},"containers":{"cna":{"title":"Ability to change environment from query in symfony/runtime","problemTypes":[{"descriptions":[{"cweId":"CWE-74","lang":"en","description":"CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.3,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/symfony/symfony/security/advisories/GHSA-x8vp-gf4q-mw5j","tags":["x_refsource_CONFIRM"],"url":"https://github.com/symfony/symfony/security/advisories/GHSA-x8vp-gf4q-mw5j"},{"name":"https://github.com/symfony/symfony/commit/a77b308c3f179ed7c8a8bc295f82b2d6ee3493fa","tags":["x_refsource_MISC"],"url":"https://github.com/symfony/symfony/commit/a77b308c3f179ed7c8a8bc295f82b2d6ee3493fa"}],"affected":[{"vendor":"symfony","product":"symfony","versions":[{"version":"< 5.4.46","status":"affected"},{"version":">= 6.0.0, < 6.4.14","status":"affected"},{"version":">= 7.0.0, < 7.1.7","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-11-06T21:09:46.750Z"},"descriptions":[{"lang":"en","value":"symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability."}],"source":{"advisory":"GHSA-x8vp-gf4q-mw5j","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"sensiolabs","product":"symfony","cpes":["cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"5.4.46","versionType":"custom"},{"version":"6.0.0","status":"affected","lessThan":"6.4.14","versionType":"custom"},{"version":"7.0.0","status":"affected","lessThan":"7.1.7","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-07T15:27:34.309967Z","id":"CVE-2024-50340","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-07T15:29:50.292Z"}}]}}