CVE-2024-51736: Command execution hijack on Windows with Process class
November 6, 2024 • Published by Fabien Potencier
Affected versions
Symfony versions <5.4.46; >=6, <6.4.14; >=7, <7.1.7 of the Symfony Process component are affected by this security issue.
The issue has been fixed in Symfony 5.4.46, 6.4.14, and 7.1.7.
Description
On Window, when an executable file named cmd.exe
is located in the current working directory it will be called by the Process
class when preparing command arguments, leading to possible hijacking.
Resolution
The Process
class now uses the absolute path to cmd.exe
.
The patch for this issue is available here for branch 5.4.
Credits
We would like to thank Jordi Boggiano for reporting the issue and Nicolas Grekas for providing the fix.
Manage your notification preferences to receive an email as soon as a Symfony security release is published.
Help the Symfony project!
As with any Open-Source project, contributing code or documentation is the most common way to help, but we also have a wide range of sponsoring opportunities.