Name | CVE-2024-50342 |
Description | symfony/http-client is a module for the Symphony PHP framework which provides powerful methods to fetch HTTP resources synchronously or asynchronously. When using the `NoPrivateNetworkHttpClient`, some internal information is still leaking during host resolution, which leads to possible IP/port enumeration. As of versions 5.4.46, 6.4.14, and 7.1.7 the `NoPrivateNetworkHttpClient` now filters blocked IPs earlier to prevent such leaks. All users are advised to upgrade. There are no known workarounds for this vulnerability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-5809-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
symfony (PTS) | bullseye | 4.4.19+dfsg-2+deb11u6 | vulnerable |
| bookworm | 5.4.23+dfsg-1+deb12u2 | vulnerable |
| bookworm (security) | 5.4.23+dfsg-1+deb12u4 | fixed |
| sid, trixie | 6.4.15+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
symfony | source | bookworm | 5.4.23+dfsg-1+deb12u3 | | DSA-5809-1 | |
symfony | source | (unstable) | 6.4.15+dfsg-1 | | | |
Notes
https://github.com/symfony/symfony/security/advisories/GHSA-9c3x-r3wp-mgxm
Fixed by: https://github.com/symfony/symfony/commit/296d4b34a33b1a6ca5475c6040b3203622520f5b (v5.4.46, v6.4.14, v7.1.7)
Fixed by: https://github.com/symfony/symfony/commit/b4bf5afdbdcb2fd03da513ee03beeabeb551e5fa (v5.4.47, v6.4.15, v7.1.8)