LWN.net Logo

php-symfony2-Yaml: code execution

Package(s):php-symfony2-Yaml CVE #(s):CVE-2013-1348 CVE-2013-1397
Created:January 28, 2013 Updated:February 4, 2013
Description: From the Symfony advisory:

When parsing an input with Yaml::parse(), and if the input is a valid filename, the input is evaluated as a PHP file before being parsed as YAML. If the input comes from an untrusted source, malicious code might be executed.

Symfony applications are not vulnerable to this attack but if you are parsing YAML with the YAML component in your application, check that your code does not pass untrusted input to Yaml::parse(). Note that Yaml\Parser::parse() is not affected. (CVE-2013-1348)

The Symfony YAML component supports PHP objects parsing and dumping (via the !!php/object: XXX notation).

When parsing an untrusted input that contains a serialized PHP object, it will be unserialized by default, which can lead to malicious code being executed.

Symfony applications are not vulnerable to this attack but if you are parsing YAML in your application, check that your code does not pass untrusted input to Yaml::parse() or Yaml\Parser::parse(). (CVE-2013-1397)

Alerts:
Fedora FEDORA-2013-1130 2013-01-28
Fedora FEDORA-2013-1167 2013-02-03
Fedora FEDORA-2013-0985 2013-02-03

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds