{"id":"CVE-2024-50345","summary":"Open redirect via browser-sanitized URLs in symfony/http-foundation","details":"symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.","aliases":["GHSA-mrqx-rp3w-jpjp"],"modified":"2026-04-11T12:47:08.940645Z","published":"2024-11-06T20:56:21.062Z","database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-601"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50345.json"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00051.html"},{"type":"WEB","url":"https://url.spec.whatwg.org"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50345.json"},{"type":"ADVISORY","url":"https://github.com/symfony/symfony/security/advisories/GHSA-mrqx-rp3w-jpjp"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50345"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/symfony/symfony","events":[{"introduced":"d78c5f403d7ee794993660b1d5155536edd36fc1"},{"fixed":"5001143568bc2bce9ec77f7a85076aa75d38795e"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50345.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}]}