Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Wed, 06 Nov 2024 21:00:00 +0000

Type Values Removed Values Added
Description Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Command execution hijack on Windows with Process class in symfony/process
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-11-06T20:51:38.536Z

Updated: 2024-11-06T20:51:38.536Z

Reserved: 2024-10-31T14:12:45.788Z

Link: CVE-2024-51736

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-06T21:15:06.600

Modified: 2024-11-08T19:01:25.633

Link: CVE-2024-51736

cve-icon Redhat

No data.