Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Fri, 22 Nov 2024 00:15:00 +0000

Type Values Removed Values Added
First Time appeared Symfony
Symfony symfony
CPEs cpe:2.3:a:symfony:symfony:*:*:*:*:*:*:*:*
Vendors & Products Symfony
Symfony symfony
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 Nov 2024 21:00:00 +0000

Type Values Removed Values Added
Description Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Command execution hijack on Windows with Process class in symfony/process
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-11-06T20:51:38.536Z

Updated: 2024-11-21T23:23:26.713Z

Reserved: 2024-10-31T14:12:45.788Z

Link: CVE-2024-51736

cve-icon Vulnrichment

Updated: 2024-11-21T23:23:19.458Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-06T21:15:06.600

Modified: 2024-11-08T19:01:25.633

Link: CVE-2024-51736

cve-icon Redhat

No data.