githubEdit

Symfony Pentesting

Tools:

https://github.com/synacktiv/eos

Exploits:

https://github.com/ambionics/symfony-exploits

Writeups/resources

https://infosecwriteups.com/how-i-was-able-to-find-multiple-vulnerabilities-of-a-symfony-web-framework-web-application-2b82cd5de144

Requirements:

Access to the symfony profiler (dev debug environment)

Interesting files:

/app_dev.php
app/config/parameters.yml

Enumeration

Scan the app for any interesting files like project sources, project files, and environmental variables

Read files detected by the scanner to discover secrets and more information for the web app

Exploitation

Achieve RCE

Requirements: Secret fragment. May be found within a configuration file in the web app.

Setup a listener, copy and paste the URL generated by the Python script into your browser, and enjoy RCE.

Last updated