Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Nov 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Command execution hijack on Windows with Process class in symfony/process | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-11-06T20:51:38.536Z
Updated: 2024-11-06T20:51:38.536Z
Reserved: 2024-10-31T14:12:45.788Z
Link: CVE-2024-51736
Vulnrichment
No data.
NVD
Status : Awaiting Analysis
Published: 2024-11-06T21:15:06.600
Modified: 2024-11-08T19:01:25.633
Link: CVE-2024-51736
Redhat
No data.