Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-46734
HistoryNov 10, 2023 - 5:49 p.m.

CVE-2023-46734 Symfony potential Cross-site Scripting vulnerabilities in CodeExtension filters

2023-11-1017:49:55
CWE-79
GitHub_M
www.cve.org
7
symfony
php
twig filters
cross-site scripting

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

20.4%

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 2.0.0, 5.0.0, and 6.0.0 and prior to versions 4.4.51, 5.4.31, and 6.3.8, some Twig filters in CodeExtension use is_safe=html but don’t actually ensure their input is safe. As of versions 4.4.51, 5.4.31, and 6.3.8, Symfony now escapes the output of the affected filters.

CNA Affected

[
  {
    "vendor": "symfony",
    "product": "symfony",
    "versions": [
      {
        "version": ">= 2.0.0, < 4.4.51",
        "status": "affected"
      },
      {
        "version": ">= 5.0.0, < 5.4.31",
        "status": "affected"
      },
      {
        "version": ">= 6.0.0, < 6.3.8",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

20.4%