CVE-2019-10910

NameCVE-2019-10910
DescriptionIn Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, when service ids allow user input, this could allow for SQL Injection and remote code execution. This is related to symfony/dependency-injection.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1778-1, DSA-4441-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
symfony (PTS)buster, buster (security)3.4.22+dfsg-2+deb10u1fixed
bullseye4.4.19+dfsg-2+deb11u1fixed
bookworm, sid5.4.11+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
drupal7source(unstable)(not affected)
symfonysourcejessie2.3.21+dfsg-4+deb8u5DLA-1778-1
symfonysourcestretch2.8.7+dfsg-1.3+deb9u2DSA-4441-1
symfonysource(unstable)3.4.22+dfsg-2

Notes

- drupal7 <not-affected> (Drupal 7 core not affected)
https://www.drupal.org/SA-CORE-2019-005
https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid

Search for package or bug name: Reporting problems