{"id":"CVE-2017-16654","details":"An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal.","aliases":["GHSA-c49r-8gj6-768r"],"modified":"2026-05-18T05:49:19.633923354Z","published":"2018-08-06T21:29:00.330Z","database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"}],"vendor_product":"debian:debian_linux","source":"CPE_FIELD","cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]},{"extracted_events":[{"introduced":"3.8.0"},{"last_affected":"3.8.30"},{"introduced":"3.8.0"},{"last_affected":"3.8.30"}],"vendor_product":"sensiolabs:symfony","source":"CPE_FIELD","cpes":["cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*"]}]},"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4262"},{"type":"REPORT","url":"https://github.com/symfony/symfony/pull/24994"},{"type":"REPORT","url":"https://symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-out-of-paths"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/symfony/security-http","events":[{"introduced":"de2f3d51160791ef254010953dbde178fee9845f"},{"last_affected":"e23595473a10892462e61443f07d19210ab505af"},{"introduced":"a6209fac5e5984ba49d8b5a1af5e5c118a1c183e"},{"last_affected":"4fe1764b69b5e7e0d74656b5214a9026313e23ab"},{"introduced":"760872233cd3147870184697e3481ffa492ac2fb"},{"last_affected":"a5c3f701b864a2bb1d6b71b859afd3efe3b9e43d"}],"database_specific":{"cpe":"cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"2.7.0"},{"last_affected":"2.7.37"},{"introduced":"3.2.0"},{"last_affected":"3.2.13"},{"introduced":"3.3.0"},{"last_affected":"3.3.12"}]}}],"versions":["v3.2.13","v3.3.12","v3.3.11","v2.7.37","v2.7.36","v3.3.10","v2.7.35","v2.7.34","v3.3.9","v3.3.8","v3.3.7","v2.7.33","v3.3.6","v3.3.5","v3.3.4","v3.3.3","v3.2.12","v3.2.11","v3.2.10","v2.7.32","v2.7.31","v2.7.30","v3.3.2","v3.3.1","v3.3.0","v3.2.9","v2.7.29","v2.7.28","v3.2.8","v2.7.27","v3.2.7","v2.7.26","v3.2.6","v3.2.5","v2.7.25","v3.2.4","v3.2.3","v3.2.2","v2.7.24","v2.7.23","v3.2.1","v3.2.0-RC2","v3.2.0","v2.7.22","v2.7.21","v2.7.20","v2.7.19","v2.7.18","v2.7.17","v2.7.16","v2.7.15","v2.7.14","v2.7.13","v2.7.12","v2.7.10","v2.7.9","v2.7.8","v2.7.7","v2.7.6","v2.7.5","v2.7.4","v2.7.3","v2.7.2","v2.7.1","v2.7.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-16654.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/symfony/symfony","events":[{"introduced":"9975b1eca3de4db792a2c3e4e16f676a4aadcd46"},{"last_affected":"c166da413153ecbb4b83c0415f7df13c250c3342"},{"introduced":"b96a144bc875684f3338f697687147a2696d73eb"},{"last_affected":"e1aabd6f50fb4586b330f9ac54b4bcdf7352a0f8"},{"introduced":"5a7e31c48e7cd4831efa409fffb661beb9995174"},{"last_affected":"1452970fc29131776505f684bd81d7a33cbaada4"}],"database_specific":{"cpe":"cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"2.7.0"},{"last_affected":"2.7.37"},{"introduced":"3.2.0"},{"last_affected":"3.2.13"},{"introduced":"3.3.0"},{"last_affected":"3.3.12"}]}}],"versions":["v3.2.13","v3.3.12","v2.7.37","v3.3.11","v2.7.36","v3.3.10","v2.7.35","v3.3.9","v3.3.8","v3.3.7","v2.7.34","v2.7.33","v3.3.6","v3.3.5","v3.2.12","v2.7.32","v3.3.4","v3.2.11","v2.7.31","v3.3.3","v3.2.10","v2.7.30","v2.7.29","v3.3.2","v3.3.1","v3.3.0","v3.2.9","v2.7.28","v2.7.26","v3.2.8","v2.7.27","v3.2.7","v3.2.6","v3.2.5","v2.7.25","v3.2.4","v3.2.3","v2.7.24","v3.2.2","v2.7.23","v3.2.1","v2.7.22","v3.2.0","v2.7.21","v2.7.20","v2.7.19","v2.7.18","v2.7.17","v2.7.16","v2.7.15","v2.7.14","v2.7.13","v2.7.12","v2.7.11","v2.7.10","v2.7.9","v2.7.8","v2.7.7","v2.7.6","v2.7.5","v2.7.4","v2.7.3","v2.7.2","v2.7.1","v2.7.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-16654.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}