{"id":"CVE-2024-50343","summary":"Incorrect response from Validator when input ends with `\\n` in symfony/validator","details":"symfony/validator is a module for the Symphony PHP framework which provides tools to validate values. It is possible to trick a `Validator` configured with a regular expression using the `$` metacharacters, with an input ending with `\\n`. Symfony as of versions 5.4.43, 6.4.11, and 7.1.4 now uses the `D` regex modifier to match the entire input. Users are advised to upgrade. There are no known workarounds for this vulnerability.","aliases":["GHSA-g3rh-rrhp-jhh9"],"modified":"2026-04-10T05:18:09.904828Z","published":"2024-11-06T21:00:55.266Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50343.json","cwe_ids":["CWE-20"]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00051.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50343.json"},{"type":"ADVISORY","url":"https://github.com/symfony/symfony/security/advisories/GHSA-g3rh-rrhp-jhh9"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50343"},{"type":"FIX","url":"https://github.com/symfony/symfony/commit/7d1032bbead9a4229b32fa6ebca32681c80cb76f"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/symfony/symfony","events":[{"introduced":"0"},{"fixed":"4a4c52e875f544f502a3b63986088315d88ff840"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.4.43"}]}},{"type":"GIT","repo":"https://github.com/symfony/symfony","events":[{"introduced":"aa4e97099b5a67bdc9f2387fe8d099f5c712f81c"},{"fixed":"658b70d9fecb295dbfdbbcbecf578fe87c030942"}],"database_specific":{"versions":[{"introduced":"6.0.0"},{"fixed":"6.4.11"}]}},{"type":"GIT","repo":"https://github.com/symfony/symfony","events":[{"introduced":"d78c5f403d7ee794993660b1d5155536edd36fc1"},{"fixed":"c2eaf9ad7fc45d83ed8f2c4f830baee4fcdae207"}],"database_specific":{"versions":[{"introduced":"7.0.0"},{"fixed":"7.1.4"}]}}],"versions":["v2.0.0","v2.0.0-RC1","v2.0.0-RC2","v2.0.0-RC3","v2.0.0-RC4","v2.0.0-RC5","v2.0.0-RC6","v2.0.0BETA1","v2.0.0BETA2","v2.0.0BETA3","v2.0.0BETA4","v2.0.0BETA5","v2.0.0PR8","v2.1.0","v2.1.0-BETA1","v2.1.0-BETA2","v2.1.0-BETA3","v2.1.0-BETA4","v2.1.0-RC1","v2.1.0-RC2","v2.2.0-BETA1","v2.2.0-BETA2","v2.3.0-BETA1","v2.3.0-BETA2","v2.4.0-BETA1","v2.4.0-BETA2","v2.5.0-BETA1","v2.5.0-BETA2","v2.6.0-BETA1","v3.0.0","v3.0.0-BETA1","v3.2.0-BETA1","v3.2.0-RC1","v3.3.0-BETA1","v4.0.0-BETA1","v4.0.0-BETA2","v4.0.0-BETA3","v4.0.0-BETA4","v4.2.0-BETA1","v4.2.0-BETA2","v4.3.0-BETA1","v5.0.0-BETA1","v5.0.0-BETA2","v5.0.0-RC1","v5.1.0-BETA1","v5.2.0-BETA1","v5.2.0-BETA2","v5.2.0-BETA3","v5.3.0-BETA1","v5.3.0-BETA2","v5.3.0-BETA3","v5.3.0-BETA4","v5.4.0","v5.4.0-BETA1","v5.4.0-BETA2","v5.4.0-BETA3","v5.4.0-RC1","v5.4.1","v5.4.10","v5.4.11","v5.4.12","v5.4.13","v5.4.14","v5.4.15","v5.4.16","v5.4.17","v5.4.18","v5.4.19","v5.4.2","v5.4.20","v5.4.21","v5.4.22","v5.4.23","v5.4.24","v5.4.25","v5.4.26","v5.4.27","v5.4.28","v5.4.29","v5.4.3","v5.4.30","v5.4.31","v5.4.32","v5.4.33","v5.4.34","v5.4.35","v5.4.36","v5.4.37","v5.4.38","v5.4.39","v5.4.4","v5.4.40","v5.4.41","v5.4.42","v5.4.5","v5.4.6","v5.4.7","v5.4.8","v5.4.9","vPR3","vPR4","vPR5","vPR6","vPR8","vPR9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50343.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}