CVE-2013-1397: Symfony Arbitrary PHP code Execution
(updated )
Symfony 2.0.x before 2.0.22, 2.1.x before 2.1.7, and 2.2.x remote attackers to execute arbitrary PHP code via a serialized PHP object to the (1) Yaml::parse or (2) Yaml\Parser::parse function, a different vulnerability than CVE-2013-1348.
References
- exchange.xforce.ibmcloud.com/vulnerabilities/81551
- github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2013-1397.yaml
- github.com/FriendsOfPHP/security-advisories/blob/master/symfony/yaml/CVE-2013-1397.yaml
- github.com/advisories/GHSA-7w53-hfpw-rg3g
- github.com/symfony/symfony
- github.com/symfony/symfony/commit/ba6e3159c0eeb3b6e21db32fce8fa2535cb3aa77
- nvd.nist.gov/vuln/detail/CVE-2013-1397
- symfony.com/blog/security-release-symfony-2-0-22-and-2-1-7-released
Code Behaviors & Features
Detect and mitigate CVE-2013-1397 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →