Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:composer/symfony/symfony@3.2.0-alpha0
purl pkg:composer/symfony/symfony@3.2.0-alpha0
Tags Ghost
Next non-vulnerable version 5.4.51
Latest non-vulnerable version 8.0.5
Risk 4.0
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-hxhq-zdyu-dudz
Aliases:
CVE-2017-16790
GHSA-cqqh-94r6-wjrg
Attacker can read all files content on the server When a form is submitted by the user, the request handler classes of the Form component merge POST data (known as the `$_POST` array in plain PHP) and uploaded files data (known as the `$_FILES` array in plain PHP) into one array. This big array forms the data that are then bound to the form. At this stage there is no difference anymore between submitted POST data and uploaded files. A user can send a crafted HTTP request where the value of a `FileType` is sent as normal `POST` data that could be interpreted as a locale file path on the server-side (for example, `file:///etc/passwd`). If the application did not perform any additional checks about the value submitted to the `FileType`, the contents of the given file on the server could have been exposed to the attacker.
3.2.14
Affected by 26 other vulnerabilities.
3.3.13
Affected by 27 other vulnerabilities.
3.4.0-BETA5
Affected by 0 other vulnerabilities.
4.0.0-BETA5
Affected by 0 other vulnerabilities.
VCID-mm7e-kb6c-vucx
Aliases:
CVE-2017-16652
GHSA-r7p7-qr7p-2rrf
`DefaultAuthenticationSuccessHandler` or `DefaultAuthenticationFailureHandler` take the content of the `_target_path` parameter and generate a redirect response but no check is performed on the path, which could be an absolute URL to an external domain, opening redirect vulnerability. Open redirect vulnerability are not too much considered but they can be exploited for example to mount effective phishing attacks.
3.2.14
Affected by 26 other vulnerabilities.
3.3.13
Affected by 27 other vulnerabilities.
3.4.0-BETA5
Affected by 0 other vulnerabilities.
4.0.0-BETA5
Affected by 0 other vulnerabilities.
VCID-vpsz-zhhq-xfbw
Aliases:
CVE-2017-16654
GHSA-c49r-8gj6-768r
An attacker can navigate to arbitrary directories via the dot-dot-slash attack This package includes various bundle readers that are used to read resource bundles from the local filesystem. The `read()` methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a `URL` parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack.
3.2.14
Affected by 26 other vulnerabilities.
3.3.13
Affected by 27 other vulnerabilities.
3.4.0-BETA5
Affected by 0 other vulnerabilities.
4.0.0-BETA5
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:47:55.310051+00:00 GitLab Importer Affected by VCID-vpsz-zhhq-xfbw https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/symfony/symfony/CVE-2017-16654.yml 38.0.0
2026-04-01T12:47:54.910309+00:00 GitLab Importer Affected by VCID-hxhq-zdyu-dudz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/symfony/symfony/CVE-2017-16790.yml 38.0.0
2026-04-01T12:47:47.130928+00:00 GitLab Importer Affected by VCID-mm7e-kb6c-vucx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/symfony/symfony/CVE-2017-16652.yml 38.0.0