Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on May 17th, 2019 📆 | 5155 Views ⚑

0

Symfony up to 2.8.49/3.4.25/4.1.11/4.2.6 Unserialization Cache privilege escalation


iSpeech

CVSS Meta Temp Score Current Exploit Price (≈)
4.9 $0-$5k

A vulnerability was found in Symfony up to 2.8.49/3.4.25/4.1.11/4.2.6 and classified as critical. Affected by this issue is a part of the component Unserialization. The manipulation with an unknown input leads to a privilege escalation vulnerability (Cache). Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.

The weakness was presented 05/16/2019 (GitHub Repository). The advisory is available at github.com. This vulnerability is handled as CVE-2019-10912 since 04/07/2019. The technical details are unknown and an exploit is not available.

Upgrading to version 2.8.50, 3.4.26, 4.1.12 or 4.2.7 eliminates this vulnerability.

See 135155, 135156, 135157 and 135159 for similar entries.

Name

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 4.9

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈4.9
VulDB Vector: ?
VulDB Reliability: ?

VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Privilege escalation / Cache (CWE-269)
Local: Yes
Remote: No

Availability: ?
Status: Not defined

Price Prediction: ?
Current Price Estimation: ?


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?

Upgrade: Symfony 2.8.50/3.4.26/4.1.12/4.2.7

04/07/2019 CVE assigned
05/16/2019 +39 days Advisory disclosed
05/17/2019 +1 days VulDB entry created
05/17/2019 +0 days VulDB last updateAdvisory: github.com
Status: Unconfirmed

CVE: CVE-2019-10912 (?)
See also: ?

Created: 05/17/2019 07:25 AM
Complete: ?

Download the whitepaper to learn more about our service!

https://vuldb.com/?id.135158

Tagged with:



Comments are closed.