Vulnerability Description
Reflected Cross-site scripting (XSS) vulnerability in the web profiler in SensioLabs Symfony 3.3.6 allows remote attackers to inject arbitrary web script or HTML via the "file" parameter, aka an _profiler/open?file= URI. NOTE: The vendor states "The XSS ... is in the web profiler, a tool that should never be deployed in production (so, we don't handle those issues as security issues).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sensiolabs | Symfony | 3.3.6 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/148125/SensioLabs-Symfony-3.3.6-Cross-Site-ExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/archive/1/542071/100/0/threadedExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/148125/SensioLabs-Symfony-3.3.6-Cross-Site-ExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/archive/1/542071/100/0/threadedExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-12040?
CVE-2018-12040 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Reflected Cross-site scripting (XSS) vulnerability in the web profiler in SensioLabs Symfony 3.3.6 allows remote attackers to inject arbitrary web script or HTML via the "file" parameter, aka an _prof...
How severe is CVE-2018-12040?
CVE-2018-12040 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-12040?
Check the references section above for vendor advisories and patch information. Affected products include: Sensiolabs Symfony.