CVE-2024-50345: Symfony vulnerable to open redirect via browser-sanitized URLs
(updated )
The Request
class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the Request
class to redirect users to another domain.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2024-50345.yaml
- github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2024-50345.yaml
- github.com/advisories/GHSA-mrqx-rp3w-jpjp
- github.com/symfony/symfony
- github.com/symfony/symfony/commit/5a9b08e5740af795854b1b639b7d45b9cbfe8819
- github.com/symfony/symfony/security/advisories/GHSA-mrqx-rp3w-jpjp
- nvd.nist.gov/vuln/detail/CVE-2024-50345
- symfony.com/cve-2024-50345
- url.spec.whatwg.org/
Detect and mitigate CVE-2024-50345 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →