logo

CVE-2024-51736 symfony/process

Package

Manager: composer
Name: symfony/process
Vulnerable Version: >=0 <5.4.46 || >=6.0.0 <6.4.14 || >=7.0.0 <7.1.7

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.0024 pctl0.47199

Details

Symfony vulnerable to command execution hijack on Windows with Process class ### Description On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. ### Resolution The `Process` class now uses the absolute path to `cmd.exe`. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/18ecd03eda3917fdf901a48e72518f911c64a1c9) for branch 5.4. ### Credits We would like to thank Jordi Boggiano for reporting the issue and Nicolas Grekas for providing the fix.

Metadata

Created: 2024-11-06T15:22:55Z
Modified: 2025-03-07T13:28:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-qq5c-677p-737q/GHSA-qq5c-677p-737q.json
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-qq5c-677p-737q
Finding: F422
Auto approve: 1