-
-
Notifications
You must be signed in to change notification settings - Fork 5.2k
[Security] Add caution on symfony cli web server exposing env vars on private network #17309
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
I'm divided about adding this. I thought it was clear that this CLI + local server is only for the But, let's wait to read more opinions. Thanks. |
we are not using it in prod at all, but in development locally but as it run a web server, one can find it on local private network and see unrelated env vars |
@nicolas-grekas what do you think about this proposal? Thanks |
This looks unrelated to the symfony binary. Any other webserver will do the same, isn't it? |
perhaps indeed; but to me it is worth noticing in the doc, thus this PR :) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it doesn't hurt to add this, but should we target 5.4
?
I merged this but I made some changes:
See e81818e Thanks! |
@javiereguiluz this make sens indeed, thx for taking care of this PR |
Hi,
One can understood that this web server is a great tool for development purposes but this addition should be added imho for knowledge :)
Context:
when checking some local data accessible on local network with coworker
we arrived to display a symfony cli served app profiler (obviously it is in
dev
env)and in the profiler > request/response panel > server parameters > regular env vars => thus exposing also symfony unrelated env vars which are included
friendly ping @wuchen90 ^^