Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-5255
HistoryMar 30, 2020 - 7:30 p.m.

CVE-2020-5255 Prevent cache poisoning via a Response Content-Type header

2020-03-3019:30:15
CWE-435
GitHub_M
www.cve.org

2.6 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L

4.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.9%

In Symfony before versions 4.4.7 and 5.0.7, when a Response does not contain a Content-Type header, affected versions of Symfony can fallback to the format defined in the Accept header of the request, leading to a possible mismatch between the response's content and Content-Type header. When the response is cached, this can prevent the use of the website by other users. This has been patched in versions 4.4.7 and 5.0.7.

CNA Affected

[
  {
    "product": "symfony",
    "vendor": "symfony",
    "versions": [
      {
        "status": "affected",
        "version": ">= 4.4.0 and < 4.4.7"
      },
      {
        "status": "affected",
        "version": ">= 5.0.0 and < 5.0.7"
      }
    ]
  }
]

2.6 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L

4.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.9%