Symfony Debug Mode Enabled

critical Web App Scanning Plugin ID 113933

Synopsis

Symfony Debug Mode Enabled

Description

Symfony is a free and open-source PHP web application framework relying on bundles, which are plugins allowing developers to hook into Symfony. Symfony offers a debug mode which allows developers to get additional tools like the web profiler and the debug toolbar to help troubleshooting their applications : stack traces on error pages, profiler and phpinfo exposing the PHP environment configuration. A remote and unauthenticated attacker could leverage these information to access sensitive information about current application requests and configuration.

Solution

Disable Symfony debug mode by setting `APP_DEBUG=0` and ensure that the exposed application is running in the `prod` environment. On older Symfony versions, ensure that access to `app_dev.php` is restricted to localhost (configuration by default). If any secret has been exposed with the debug mode, revoke and rotate it.

See Also

https://symfony.com/doc/6.3/configuration/front_controllers_and_kernel.html#debug-mode

https://www.synacktiv.com/en/publications/looting-symfony-with-eos

Plugin Details

Severity: Critical

ID: 113933

Type: remote

Published: 5/31/2023

Updated: 5/31/2023

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS Score Source: Tenable

CVSS v4

Risk Factor: Critical

Base Score: 9.2

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

CVSS Score Source: Tenable

Vulnerability Information

CPE: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*

Reference Information