fkie_cve-2012-5574
Vulnerability from fkie_nvd
Published
2012-12-18 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
lib/form/sfForm.class.php in Symfony CMS before 1.4.20 allows remote attackers to read arbitrary files via a crafted upload request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sensiolabs | symfony | * | |
sensiolabs | symfony | 1.4.0 | |
sensiolabs | symfony | 1.4.0 | |
sensiolabs | symfony | 1.4.0 | |
sensiolabs | symfony | 1.4.1 | |
sensiolabs | symfony | 1.4.2 | |
sensiolabs | symfony | 1.4.3 | |
sensiolabs | symfony | 1.4.4 | |
sensiolabs | symfony | 1.4.5 | |
sensiolabs | symfony | 1.4.6 | |
sensiolabs | symfony | 1.4.7 | |
sensiolabs | symfony | 1.4.8 | |
sensiolabs | symfony | 1.4.9 | |
sensiolabs | symfony | 1.4.10 | |
sensiolabs | symfony | 1.4.11 | |
sensiolabs | symfony | 1.4.12 | |
sensiolabs | symfony | 1.4.13 | |
sensiolabs | symfony | 1.4.14 | |
sensiolabs | symfony | 1.4.15 | |
sensiolabs | symfony | 1.4.16 | |
sensiolabs | symfony | 1.4.17 | |
sensiolabs | symfony | 1.4.18 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D5A33CD-B820-44E7-8FBD-CD45E2078C65", "versionEndIncluding": "1.4.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4F1040D-AFBA-4A73-AC13-8504A0625AEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "84094B27-A701-4978-91D7-587AF314B6AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79B1B57C-DE96-4ECB-AD92-F52667FC4E18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "78201955-7DCB-4FA2-B745-67DDE420BB2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F4680367-B5EA-4593-8F72-0E4C1EAA30AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "DF0B4301-FF9E-4C02-8E0F-42C25831EC99", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A4C4F47-4DEB-45A0-BD05-245079D1A914", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "3356E269-D119-4130-92A5-A8DBA0FAB738", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E0F0D5B3-00CE-4A86-9063-14B150CB973A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "4FBC37A5-5ABA-4A1B-9CF8-E10D74B603C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "7AC08043-3427-4F2F-BE15-9800AD5DE6B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "2E73B1AE-6AAE-4862-89D5-E58F3FEF474F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "82BF2472-CD81-4578-8FE4-52BEF395FD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "2143A607-79CE-4D2D-BE8E-3F3F164733B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "C1A59CD0-89BC-461C-B7D7-74CB94C2EF15", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "3197A9BD-E102-4397-932F-BB3ED97937AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "3FEB7732-879C-4C82-82F4-89C4D37A53C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "729995D3-4D28-4ECF-9A2B-61EF87F8A766", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "1BCCFEAB-1CBE-4EF6-9DB0-D614D349A6E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "7003FBF4-75C0-497E-B274-D20FF651A527", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "6AE1A088-2CAE-489A-83AF-1612F9AB8D45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "lib/form/sfForm.class.php in Symfony CMS before 1.4.20 allows remote attackers to read arbitrary files via a crafted upload request." }, { "lang": "es", "value": "lib/form/sfForm.class.php en Symfony CMS anterior a v1.4.20 permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de una petici\u00f3n de carga manipulada." } ], "id": "CVE-2012-5574", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-12-18T01:55:06.447", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093698.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093920.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093922.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51372" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://symfony.com/blog/security-release-symfony-1-4-20-released" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://trac.symfony-project.org/changeset/33598" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2012/11/26/12" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/87869" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/56685" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=444696" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880240" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093698.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093920.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093922.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://symfony.com/blog/security-release-symfony-1-4-20-released" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://trac.symfony-project.org/changeset/33598" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2012/11/26/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/87869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56685" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=444696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880240" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80309" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…