CVE-2024-36610: Withdrawn Advisory: Symfony's VarDumper vulnerable to unsafe deserialization
(updated )
Withdrawn Advisory
This advisory has been withdrawn because the report is not part of a valid vulnerability. This link is maintained to preserve external references. For more information, see advisory-database/pull/5048.
Original Description
A deserialization vulnerability exists in the Stub class of the VarDumper module in Symfony. The vulnerability stems from deficiencies in the original implementation when handling properties with null or uninitialized values. An attacker could construct specific serialized data and use this vulnerability to execute unauthorized code.
References
- gist.github.com/1047524396/24e93f2905850235e42ad7db6e878bd5
- github.com/advisories/GHSA-cg28-v4wq-whv5
- github.com/github/advisory-database/pull/5048
- github.com/symfony/symfony
- github.com/symfony/symfony/blob/v7.0.3/src/Symfony/Component/VarDumper/Cloner/Stub.php
- github.com/symfony/symfony/commit/3ffd495bb3cc4d2e24e35b2d83c5b909cab7e259
- nvd.nist.gov/vuln/detail/CVE-2024-36610
Detect and mitigate CVE-2024-36610 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →