Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. symfony/intl
  4. ›
  5. CVE-2017-16654

CVE-2017-16654: An attacker can navigate to arbitrary directories via the dot-dot-slash attack

August 6, 2018 (updated March 13, 2019)

This package includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack.

References

  • cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16654
  • symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-out-of-paths
  • github.com/symfony/symfony/pull/24994

Code Behaviors & Features

Detect and mitigate CVE-2017-16654 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from v2.7.0-alpha0 up to v2.7.37, all versions starting from v2.8.0-alpha0 up to v2.8.30, all versions starting from v3.2.0-alpha0 up to v3.2.13, all versions starting from v3.3.0-alpha0 up to v3.3.12

Fixed versions

  • v2.7.38
  • v2.8.31
  • v3.2.14
  • v3.3.13
  • v3.4-BETA5
  • v4.0-BETA5

Solution

Upgrade to versions v2.7.38, v2.8.31, v3.2.14, v3.3.13, v3.4-BETA5, v4.0-BETA5 or above.

Impact 7.5 HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

packagist/symfony/intl/CVE-2017-16654.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:22 +0000.