CVE-2012-6431

Symfony 2.0.x before 2.0.20 does not process URL encoded data consistently within the Routing and Security components, which allows remote attackers to bypass intended URI restrictions via a doubly encoded string.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sensiolabs:symfony:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.14:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.16:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.17:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.18:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.0.19:*:*:*:*:*:*:*

History

21 Nov 2024, 01:46

Type Values Removed Values Added
References () http://symfony.com/blog/security-release-symfony-2-0-20-and-2-1-5-released - Vendor Advisory () http://symfony.com/blog/security-release-symfony-2-0-20-and-2-1-5-released - Vendor Advisory

Information

Published : 2012-12-27 11:47

Updated : 2024-11-21 01:46


NVD link : CVE-2012-6431

Mitre link : CVE-2012-6431

CVE.ORG link : CVE-2012-6431


JSON object : View

Products Affected

sensiolabs

  • symfony
CWE
CWE-264

Permissions, Privileges, and Access Controls