CVE-2024-50340

7.3 HIGH

📋 TL;DR

This vulnerability in Symfony's runtime component allows attackers to manipulate the application's environment or debug mode by sending specially crafted query strings when the PHP directive register_argv_argc is enabled. It affects Symfony applications using the symfony/runtime component with vulnerable versions. The vulnerability enables attackers to potentially change application behavior or access debug information.

💻 Affected Systems

Products:
  • symfony/runtime
  • Symfony PHP framework
Versions: All versions before 5.4.46, 6.4.14, and 7.1.7
Operating Systems: All operating systems running PHP with Symfony
Default Config Vulnerable: ✅ No
Notes: Requires PHP directive register_argv_argc to be set to 'on' and non-SAPI PHP runtime environment

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enable debug mode to expose sensitive application information, change environment configurations to bypass security controls, or cause application instability leading to denial of service.

🟠

Likely Case

Attackers could enable debug mode to leak sensitive application data, configuration details, or internal paths, potentially facilitating further attacks.

🟢

If Mitigated

With proper input validation and security controls, the impact is limited to potential information disclosure rather than full system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires specific PHP configuration and sending crafted query strings to vulnerable endpoints

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4.46, 6.4.14, or 7.1.7 depending on Symfony version

Vendor Advisory: https://github.com/symfony/symfony/security/advisories/GHSA-x8vp-gf4q-mw5j

Restart Required: Yes

Instructions:

1. Identify your Symfony version. 2. Update to the patched version: composer update symfony/runtime. 3. Clear cache: php bin/console cache:clear. 4. Restart your web server or PHP-FPM service.

🔧 Temporary Workarounds

Disable register_argv_argc PHP directive

all

Set the PHP directive register_argv_argc to 'off' in your PHP configuration

php -i | grep register_argv_argc
Edit php.ini: register_argv_argc = Off

🧯 If You Can't Patch

  • Set PHP directive register_argv_argc to 'off' in all PHP configurations
  • Implement web application firewall rules to block requests with suspicious query string patterns

🔍 How to Verify

Check if Vulnerable:

Check Symfony version with: composer show symfony/runtime | grep versions. If version is below 5.4.46, 6.4.14, or 7.1.7, and register_argv_argc is enabled, the system is vulnerable.

Check Version:

composer show symfony/runtime | grep versions

Verify Fix Applied:

Verify Symfony version is 5.4.46+, 6.4.14+, or 7.1.7+ with: composer show symfony/runtime

📡 Detection & Monitoring

Log Indicators:

  • Unusual query string patterns in access logs
  • Requests with specially crafted parameters
  • Changes in application environment or debug mode

Network Indicators:

  • HTTP requests with unusual query string parameters
  • Multiple requests attempting different parameter combinations

SIEM Query:

web_access_logs WHERE url_query CONTAINS 'argv' OR url_query CONTAINS 'argc' OR url_query MATCHES '.*[=&].*[=&].*'

🔗 References

📤 Share & Export