Deserialization of Untrusted Data
CVE-2024-28859
Summary
Symfony1 is a community fork of symfony 1.4 with DIC, form enhancements, latest Swiftmailer, better performance, composer compatible and PHP 8 support. Symfony 1 has a gadget chain due to vulnerable Swift Mailer dependency that would enable an attacker to get remote code execution if a developer unserialize user input in his project. This vulnerability present no direct threat but is a vector that will enable remote code execution if a developper deserialize user untrusted data. Symfony 1 depends on Swift Mailer which is bundled by default in vendor directory in the default installation since 1.3.0. Swift Mailer classes implement some "__destruct()" methods. These methods are called when php destroys the object in memory. However, it is possible to include any object type in "$this->_keys" to make PHP access to another array/object properties than intended by the developer. In particular, it is possible to abuse the array access which is triggered on foreach($this->_keys ...) for any class implementing ArrayAccess interface. This may allow an attacker to execute any PHP command which leads to remote code execution. This affects friendsofsymfony1/symfony1 versions 1.3.0 through 1.5.17 and swiftmailer/swiftmailer versions through 5.4.12 , 6.0.0 through 6.2.4. NOTE: friendsofsymfony1/symfony1 is vulnerable due to vulnerable swiftmailer/swiftmailer dependency.
- HIGH
- NETWORK
- LOW
- UNCHANGED
- NONE
- LOW
- LOW
- LOW
CWE-502 - Deserialization of Untrusted Data
Deserialization of untrusted data vulnerabilities enable an attacker to replace or manipulate a serialized object, replacing it with malicious data. When the object is deserialized at the victim's end the malicious data is able to compromise the victim’s system. The exploit can be devastating, its impact may range from privilege escalation, broken access control, or denial of service attacks to allowing unauthorized access to the application's internal code and logic which can compromise the entire system.
Advisory Timeline
- Published