Vulnerability Description
An issue was discovered in HttpKernel in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. When using HttpCache, the values of the X-Forwarded-Host headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sensiolabs | Symfony | >= 2.7.0, <= 2.7.48 |
Related Weaknesses (CWE)
References
- https://github.com/symfony/symfony/commit/725dee4cd8b4ccd52e335ae4b4522242cea9bdIssue TrackingPatchThird Party Advisory
- https://symfony.com/blog/cve-2018-14774-possible-host-header-injection-when-usinPatchThird Party Advisory
- https://github.com/symfony/symfony/commit/725dee4cd8b4ccd52e335ae4b4522242cea9bdIssue TrackingPatchThird Party Advisory
- https://symfony.com/blog/cve-2018-14774-possible-host-header-injection-when-usinPatchThird Party Advisory
FAQ
What is CVE-2018-14774?
CVE-2018-14774 is a vulnerability with a CVSS score of 7.2 (HIGH). An issue was discovered in HttpKernel in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. When using HttpC...
How severe is CVE-2018-14774?
CVE-2018-14774 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-14774?
Check the references section above for vendor advisories and patch information. Affected products include: Sensiolabs Symfony.