An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1707-1 symfony security update
Debian DSA Debian DSA DSA-4262-1 symfony security update
EUVD EUVD EUVD-2022-3499 An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal.
Github GHSA Github GHSA GHSA-c49r-8gj6-768r Symfony Directory Traversal
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T20:27:04.443Z

Reserved: 2017-11-07T00:00:00

Link: CVE-2017-16654

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-08-06T21:29:00.330

Modified: 2024-11-21T03:16:46.353

Link: CVE-2017-16654

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses