Symfony vulnerable to command execution hijack on Windows with Process class
Description
Published to the GitHub Advisory Database
Nov 6, 2024
Reviewed
Nov 6, 2024
Published by the National Vulnerability Database
Nov 6, 2024
Last updated
Mar 29, 2025
Description
On Windows, when an executable file named
cmd.exeis located in the current working directory it will be called by theProcessclass when preparing command arguments, leading to possible hijacking.Resolution
The
Processclass now uses the absolute path tocmd.exe.The patch for this issue is available here for branch 5.4.
Credits
We would like to thank Jordi Boggiano for reporting the issue and Nicolas Grekas for providing the fix.
References