GHSA-2r5h-6r7v-5m7c

Suggest an improvement
Source
https://github.com/advisories/GHSA-2r5h-6r7v-5m7c
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-2r5h-6r7v-5m7c/GHSA-2r5h-6r7v-5m7c.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2r5h-6r7v-5m7c
Aliases
  • CVE-2013-1348
Published
2022-05-17T01:36:50Z
Modified
2024-12-08T05:38:54.465120Z
Summary
Symphony Vulnerable to PHP Code Injection via YAML Parsing
Details

The Yaml::parse function in Symfony 2.0.x before 2.0.22 remote attackers to execute arbitrary PHP code via a PHP file, a different vulnerability than CVE-2013-1397.

Database specific
{
    "nvd_published_at": "2014-06-02T15:55:00Z",
    "cwe_ids": [
        "CWE-94"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-04-25T22:09:29Z"
}
References

Affected packages

Packagist / symfony/symfony

Package

Name
symfony/symfony
Purl
pkg:composer/symfony/symfony

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.0.0
Fixed
2.0.22

Affected versions

2.*

2.0.4
2.0.5
2.0.6
2.0.7

v2.*

v2.0.9
v2.0.10
v2.0.11
v2.0.12
v2.0.13
v2.0.14
v2.0.15
v2.0.16
v2.0.17
v2.0.18
v2.0.19
v2.0.20
v2.0.21

Packagist / symfony/yaml

Package

Name
symfony/yaml
Purl
pkg:composer/symfony/yaml

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.0.0
Fixed
2.0.22

Affected versions

2.*

2.0.4
2.0.5
2.0.6
2.0.7

v2.*

v2.0.9
v2.0.10
v2.0.12
v2.0.13
v2.0.14
v2.0.15
v2.0.16
v2.0.17
v2.0.18
v2.0.19
v2.0.20
v2.0.21