CVE-2020-5255
low-risk
Published 2020-03-30
In Symfony before versions 4.4.7 and 5.0.7, when a `Response` does not contain a `Content-Type` header, affected versions of Symfony can fallback to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can prevent the use of the website by other users. This has been patched in versions 4.4.7 and 5.0.7.
Do I need to act?
-
0.37% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.6/10
Low
NETWORK
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (8)
Third Party Advisory
https://github.com/symfony/symfony/security/advisories/GHSA-mcx4-f5f5-4859
Third Party Advisory
https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-co...
Third Party Advisory
https://github.com/symfony/symfony/security/advisories/GHSA-mcx4-f5f5-4859
Third Party Advisory
https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-co...
16
/ 100
low-risk
Severity
10/34 · Low
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal