Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:composer/symfony/http-kernel@5.3.12
purl pkg:composer/symfony/http-kernel@5.3.12
Next non-vulnerable version 5.4.20
Latest non-vulnerable version 6.2.6
Risk 3.1
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-rgh3-ef8t-k3ec
Aliases:
CVE-2022-24894
GHSA-h7vf-5wrv-9fhv
GMS-2023-209
GMS-2023-212
Duplicate This advisory duplicates another.
5.4.20
Affected by 0 other vulnerabilities.
6.0.0-BETA1
Affected by 0 other vulnerabilities.
6.0.20
Affected by 0 other vulnerabilities.
6.1.0-BETA1
Affected by 0 other vulnerabilities.
6.1.12
Affected by 0 other vulnerabilities.
6.2.0-BETA1
Affected by 0 other vulnerabilities.
6.2.6
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-n3d2-zwve-gbf5 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') `Symfony/Http-Kernel` is the HTTP kernel component for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Headers that are not part of the `trusted_headers` allowed list are ignored and protect users from Cache poisoning attacks. In Symfony, maintainers added support for the `X-Forwarded-Prefix` headers, but this header was accessible in SubRequest, even if it was not part of the `trusted_headers` allowed list. An attacker could leverage this opportunity to forge requests containing a `X-Forwarded-Prefix` header, leading to a web cache poisoning issue. CVE-2021-41267
GHSA-q3j3-w37x-hq2q