Information Exposure Affecting sylius/sylius package, versions >=1.5.0, <1.5.1 >=1.6.0, <1.6.3 >=1.4.0, <1.4.5 >=1.3.0, <1.3.12 <1.3
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
0.07% (30th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-SYLIUSSYLIUS-543315
- published 27 Jan 2020
- disclosed 27 Jan 2020
- credit Unknown
Introduced: 27 Jan 2020
CVE-2020-5220 Open this link in a new tabHow to fix?
Upgrade sylius/sylius
to version 1.5.1, 1.6.3, 1.4.5, 1.3.12, 1.3 or higher.
Overview
sylius/sylius is a platform for PHP, based on Symfony framework.
Affected versions of this package are vulnerable to Information Exposure. ResourceBundle
accepts and uses any serialisation groups to be passed via a HTTP header. This might lead to data exposure by using an unintended serialisation group - for example it could make Shop API use a more permissive group from Admin API.