Symfony vulnerable to command execution hijack on Windows with Process class
Description
Published to the GitHub Advisory Database
Nov 6, 2024
Reviewed
Nov 6, 2024
Published by the National Vulnerability Database
Nov 6, 2024
Last updated
Nov 6, 2024
Description
On Window, when an executable file named
cmd.exe
is located in the current working directory it will be called by theProcess
class when preparing command arguments, leading to possible hijacking.Resolution
The
Process
class now uses the absolute path tocmd.exe
.The patch for this issue is available here for branch 5.4.
Credits
We would like to thank Jordi Boggiano for reporting the issue and Nicolas Grekas for providing the fix.
References