You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Symfony vulnerable to command execution hijack on Windows with Process class
High severity
GitHub Reviewed
Published
Nov 6, 2024
in
symfony/symfony
•
Updated Mar 29, 2025
On Windows, when an executable file named cmd.exe is located in the current working directory it will be called by the Process class when preparing command arguments, leading to possible hijacking.
Resolution
The Process class now uses the absolute path to cmd.exe.
The patch for this issue is available here for branch 5.4.
Credits
We would like to thank Jordi Boggiano for reporting the issue and Nicolas Grekas for providing the fix.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Learn more on MITRE.
Description
On Windows, when an executable file named
cmd.exeis located in the current working directory it will be called by theProcessclass when preparing command arguments, leading to possible hijacking.Resolution
The
Processclass now uses the absolute path tocmd.exe.The patch for this issue is available here for branch 5.4.
Credits
We would like to thank Jordi Boggiano for reporting the issue and Nicolas Grekas for providing the fix.
References