In SyliusResourceBundle prior to 1.3.14, 1.4.7, 1.5.2 and 1.6.4, request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the malicious user to access any public service by manipulating that request parameter, allowing for Remote Code Execution. This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions before 1.3 were not patched.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sylius syliusresourcebundle |