{"id":"CVE-2018-14773","details":"An issue was discovered in Http Foundation in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. It arises from support for a (legacy) IIS header that lets users override the path in the request URL via the X-Original-URL or X-Rewrite-URL HTTP request header. These headers are designed for IIS support, but it's not verified that the server is in fact running IIS, which means anybody who can send these requests to an application can trigger this. This affects \\Symfony\\Component\\HttpFoundation\\Request::prepareRequestUri() where X-Original-URL and X_REWRITE_URL are both used. The fix drops support for these methods so that they cannot be used as attack vectors such as web cache poisoning.","aliases":["GHSA-8wgj-6wx8-h5hq"],"modified":"2026-04-10T04:06:03.182644Z","published":"2018-08-03T17:29:00.297Z","references":[{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4441"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/104943"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041405"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html"},{"type":"REPORT","url":"https://seclists.org/bugtraq/2019/May/21"},{"type":"FIX","url":"https://symfony.com/blog/cve-2018-14773-remove-support-for-legacy-and-risky-http-headers"},{"type":"FIX","url":"https://www.drupal.org/SA-CORE-2018-005"},{"type":"FIX","url":"https://github.com/symfony/symfony/commit/e447e8b92148ddb3d1956b96638600ec95e08f6b"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/drupal/drupal","events":[{"introduced":"0"},{"last_affected":"35c2f3ca5c935f3d8bde15932a712677c9bbd50f"},{"introduced":"0"},{"last_affected":"d62812dc17ce593beb2ccd4cdbee1a76c95e3fd7"},{"introduced":"35c2f3ca5c935f3d8bde15932a712677c9bbd50f"},{"fixed":"37126ee7072e91debe8ad359add4b711d2b97e29"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"9.0"},{"introduced":"8.0.0"},{"fixed":"8.5.6"}]}},{"type":"GIT","repo":"https://github.com/symfony/symfony","events":[{"introduced":"0"},{"last_affected":"34d6116e2b80351c5a6f591285a4e9381b0dd127"},{"introduced":"5615b92cd452cd54f1433a3f53de87c096a1107f"},{"last_affected":"e7f50768f107fa951f4c80dc447b893502cf2e89"},{"introduced":"5a7e31c48e7cd4831efa409fffb661beb9995174"},{"last_affected":"4639525c796227ec36652ad97192a5eb3de74f76"},{"introduced":"0a47db379b8cc74cdd84e1e6870fafc4a4ac8351"},{"last_affected":"c406c5a4f11fc00b60d3ec585125350418c4568d"},{"introduced":"26ca7023b1c45dce951da7206ed70049267d27bc"},{"last_affected":"b2fc878468756fbfac367a48a1060bbf3974e9be"},{"introduced":"58261043876feb695640457c5675bb331a6eb3b7"},{"last_affected":"c42cc18492fe7bbfc507822ac62e3179a6518d71"},{"fixed":"e447e8b92148ddb3d1956b96638600ec95e08f6b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.7.48"},{"introduced":"2.8.0"},{"last_affected":"2.8.43"},{"introduced":"3.3.0"},{"last_affected":"3.3.17"},{"introduced":"3.4.0"},{"last_affected":"3.4.13"},{"introduced":"4.0.0"},{"last_affected":"4.0.13"},{"introduced":"4.1.0"},{"last_affected":"4.1.2"}]}}],"versions":["8.0.0","8.1.0-beta1","8.5.0","8.5.0-alpha1","8.5.0-beta1","8.5.0-rc1","8.5.4","8.5.5","9.0.0","9.0.0-alpha1","9.0.0-alpha2","9.0.0-beta1","9.0.0-beta2","9.0.0-beta3","9.0.0-rc1","v2.0.0","v2.0.0-RC1","v2.0.0-RC2","v2.0.0-RC3","v2.0.0-RC4","v2.0.0-RC5","v2.0.0-RC6","v2.0.0BETA1","v2.0.0BETA2","v2.0.0BETA3","v2.0.0BETA4","v2.0.0BETA5","v2.0.0PR8","v2.1.0","v2.1.0-BETA1","v2.1.0-BETA2","v2.1.0-BETA3","v2.1.0-BETA4","v2.1.0-RC1","v2.1.0-RC2","v2.2.0-BETA1","v2.2.0-BETA2","v2.3.0-BETA1","v2.3.0-BETA2","v2.4.0-BETA1","v2.4.0-BETA2","v2.5.0-BETA1","v2.5.0-BETA2","v2.6.0-BETA1","v2.7.0","v2.7.0-BETA1","v2.7.0-BETA2","v2.7.1","v2.7.10","v2.7.11","v2.7.12","v2.7.13","v2.7.14","v2.7.15","v2.7.16","v2.7.17","v2.7.18","v2.7.19","v2.7.2","v2.7.20","v2.7.21","v2.7.22","v2.7.23","v2.7.24","v2.7.25","v2.7.26","v2.7.27","v2.7.28","v2.7.29","v2.7.3","v2.7.30","v2.7.31","v2.7.32","v2.7.33","v2.7.34","v2.7.35","v2.7.36","v2.7.37","v2.7.38","v2.7.39","v2.7.4","v2.7.40","v2.7.41","v2.7.42","v2.7.43","v2.7.44","v2.7.45","v2.7.46","v2.7.47","v2.7.48","v2.7.5","v2.7.6","v2.7.7","v2.7.8","v2.7.9","v2.8.0","v2.8.1","v2.8.10","v2.8.11","v2.8.12","v2.8.13","v2.8.14","v2.8.15","v2.8.16","v2.8.17","v2.8.18","v2.8.19","v2.8.2","v2.8.20","v2.8.21","v2.8.22","v2.8.23","v2.8.24","v2.8.25","v2.8.26","v2.8.27","v2.8.28","v2.8.29","v2.8.3","v2.8.30","v2.8.31","v2.8.32","v2.8.33","v2.8.34","v2.8.35","v2.8.36","v2.8.37","v2.8.38","v2.8.39","v2.8.4","v2.8.40","v2.8.41","v2.8.42","v2.8.43","v2.8.5","v2.8.6","v2.8.7","v2.8.8","v2.8.9","v3.3.0","v3.3.1","v3.3.10","v3.3.11","v3.3.12","v3.3.13","v3.3.14","v3.3.15","v3.3.16","v3.3.17","v3.3.2","v3.3.3","v3.3.4","v3.3.5","v3.3.6","v3.3.7","v3.3.8","v3.3.9","v3.4.0","v3.4.1","v3.4.10","v3.4.11","v3.4.12","v3.4.13","v3.4.2","v3.4.3","v3.4.4","v3.4.5","v3.4.6","v3.4.7","v3.4.8","v3.4.9","v4.0.0","v4.0.1","v4.0.10","v4.0.11","v4.0.12","v4.0.13","v4.0.2","v4.0.3","v4.0.4","v4.0.5","v4.0.6","v4.0.7","v4.0.8","v4.0.9","v4.1.0","v4.1.1","v4.1.2","vPR3","vPR4","vPR5","vPR6","vPR8","vPR9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-14773.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}]}