Symfony-profiler

Context

Symfony is an open source applicative framework used for PHP applications.
When the application is deployed in development mode, Symfony enables a debug component called the web profiler.
This component offers multiple features for developers to inspect the application at runtime. For attackers, a bunch of information can be extracted from the profiler: routes, cookies, credentials, files, etc.
 

Impacted Assets

The underlying server hosting the Symfony framework as well as the applicative components interacting if credentials are found.
 

Exploit or command to run 

You can access the Symfony profiler dashboard with the following URL :
{IMPACTED-ASSET}/app_dev.php/_profiler/empty/search/results?limit=10 

From Symfony 3.x, the web profiler allows reading application files under the root directory. This feature is used by developper to quickly identify the source code responsible for handling a request. However, it can be abused to read configuration files: 

We can then read applicative configuration files potentially containing technical secrets (database credentials, applicative sessions tokens).
 

Consequences

Cyber-terms

In the scenario the attacker obtain valid credentials, the impact is tied to the secret identified (access to the database, access to the application ...). The impact can range from confidentiality of technical details to the compromise of the database information.
 

Managerial terms

The impact of the vulnerability can range from little impact to direct financial losses by altering the content of the compromised database or the underlying server.
 

Remediation

You can disable the debug mode by editing the Symfony configuration file:
# app/config/config.yml
framework:
    profiler:
        enabled: false