CVE-2024-50342
PHP vulnerability analysis and mitigation

Overview

The CVE-2024-50342 affects symfony/http-client, a module for the Symphony PHP framework that provides methods to fetch HTTP resources synchronously or asynchronously. The vulnerability was discovered by Linus Karlsson and Chris Smith, and it involves information leakage during host resolution when using the NoPrivateNetworkHttpClient component, which could lead to IP/port enumeration. The issue affects versions prior to 5.4.46, 6.4.14, and 7.1.7 (GitHub Advisory).

Technical details

The vulnerability stems from the NoPrivateNetworkHttpClient component not filtering blocked IPs early enough in the process, which results in internal information leakage during host resolution. The issue has been assigned a CVSS v3.1 base score of 3.1 (LOW) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N, indicating it requires network access, has high attack complexity, requires low privileges, and can result in low confidentiality impact (GitHub Advisory).

Impact

The vulnerability allows potential attackers to perform IP and port enumeration of internal networks, which could expose sensitive information about the network infrastructure. This information leakage occurs during the host resolution process, potentially revealing details about private network configurations (GitHub Advisory).

Mitigation and workarounds

The issue has been fixed in versions 5.4.46, 6.4.14, and 7.1.7. The patch modifies the NoPrivateNetworkHttpClient to filter blocked IPs earlier in the process to prevent information leaks. Users are advised to upgrade to these patched versions. The fix is implemented through a modification that ensures proper filtering of private network addresses before connection attempts (GitHub Advisory, Ubuntu Notice).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-898v-775g-777cCRITICAL9.4
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-5j8p-438x-rgg5CRITICAL9.3
  • PHPPHP
  • onelogin/php-saml
NoYesDec 09, 2025
GHSA-j8g6-5gqc-mq36HIGH8.2
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-pvcv-q3q7-266gHIGH8.1
  • PHPPHP
  • filament/filament
NoYesDec 09, 2025
GHSA-6w82-v552-wjw2HIGH7.1
  • PHPPHP
  • shopware/shopware
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management