Symfony Security vulnerabilities
17 known vulnerabilities affecting symfony/security.
Total CVEs
17
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH7MEDIUM6LOW1
Vulnerabilities
Page 1 of 1
CVE-2017-11365CRITICAL≥ 2.7.30, < 2.7.32≥ 2.8.23, < 2.8.25+2 more2022-05-24
CVE-2017-11365 [CRITICAL] CWE-284 Symfony Incorrect Access Control
Symfony Incorrect Access Control
Certain Symfony products are affected by: Incorrect Access Control. This affects Symfony 2.7.30 and Symfony 2.8.23 and Symfony 3.2.10 and Symfony 3.3.3. The type of exploitation is: remote. The component is: Password validator.
ghsaosv
CVE-2016-1902HIGH≥ 2.3.0, < 2.3.37≥ 2.4.0, < 2.6.13+1 more2022-05-17
CVE-2016-1902 [HIGH] CWE-332 Symfony Cryptographic Vulnerability
Symfony Cryptographic Vulnerability
The nextBytes function in the SecureRandom class in Symfony before 2.3.37, 2.6.x before 2.6.13, and 2.7.x before 2.7.9 does not properly generate random numbers when used with PHP 5.x without the paragonie/random_compat library and the openssl_random_pseudo_bytes function fails, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors.
ghsaosv
CVE-2015-8125HIGH≥ 2.3.0, < 2.3.35≥ 2.4.0, < 2.6.12+1 more2022-05-17
CVE-2015-8125 [HIGH] CWE-208 Symfony Vulnerable to Timing Attack
Symfony Vulnerable to Timing Attack
Symfony 2.3.x before 2.3.35, 2.6.x before 2.6.12, and 2.7.x before 2.7.7 might allow remote attackers to have unspecified impact via a timing attack involving the (1) `Symfony/Component/Security/Http/RememberMe/PersistentTokenBasedRememberMeServices` or (2) `Symfony/Component/Security/Http/Firewall/DigestAuthenticationListener` class in the Symfony Security Component, or (3) legacy CSRF implemen
ghsaosv
CVE-2016-4423HIGH≥ 2.3.0, < 2.3.41≥ 2.4.0, < 2.7.13+2 more2022-05-17
CVE-2016-4423 [HIGH] Symphony Denial of Service Via Overlong Usernames
Symphony Denial of Service Via Overlong Usernames
The attemptAuthentication function in `Component/Security/Http/Firewall/UsernamePasswordFormAuthenticationListener.php` in Symfony before 2.3.41, 2.7.x before 2.7.13, 2.8.x before 2.8.6, and 3.0.x before 3.0.6 does not limit the length of a username stored in a session, which allows remote attackers to cause a denial of service (session storage consumption) via a series of au
ghsaosv
CVE-2013-5958MEDIUMCVSS 5.0≥ 2.0.0, < 2.0.25≥ 2.1.0, < 2.1.13+2 more2022-05-17
CVE-2013-5958 [MEDIUM] CWE-789 Symfony Denial of Service Via Long Password Hashing
Symfony Denial of Service Via Long Password Hashing
The Security component in Symfony 2.0.x before 2.0.25, 2.1.x before 2.1.13, 2.2.x before 2.2.9, and 2.3.x before 2.3.6 allows remote attackers to cause a denial of service (CPU consumption) via a long password that triggers an expensive hash computation, as demonstrated by a PBKDF2 computation, a similar issue to CVE-2013-5750.
ghsaosv
CVE-2012-6431MEDIUM≥ 2.0.0, < 2.0.192022-05-17
CVE-2012-6431 [MEDIUM] CWE-287 Symfony Allows URI Restrictions Bypass Via Double-Encoded String
Symfony Allows URI Restrictions Bypass Via Double-Encoded String
On the Symfony 2.0.x version, there's a security issue that allows access to routes protected by a firewall even when the user is not logged in.
Both the Routing component and the Security component uses the path returned by `getPathInfo()` to match a Request. The `getPathInfo()` returns a decoded path, but the Routing component (`Symf
ghsaosv
CVE-2016-2403CRITICAL≥ 2.8.0, < 2.8.6≥ 3.0.0, < 3.0.62022-05-14
CVE-2016-2403 [CRITICAL] CWE-287 Symfony Authentication Bypass
Symfony Authentication Bypass
Symfony before 2.8.6 and 3.x before 3.0.6 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind.
ghsaosv
CVE-2018-11407CRITICALCVSS 9.8≥ 2.8.0, < 2.8.37≥ 3.0.0, < 3.3.17+2 more2022-05-14
CVE-2018-11407 [CRITICAL] CWE-287 Symfony Authentication Bypass
Symfony Authentication Bypass
An issue was discovered in the LDAP component in Symfony 2.8.x before 2.8.37, 3.3.x before 3.3.17, 3.4.x before 3.4.7, and 4.0.x before 4.0.7. It allows remote attackers to bypass authentication by logging in with a "null" password and valid username, which triggers an unauthenticated bind. **NOTE:** this issue exists because of an incomplete fix for CVE-2016-2403.
ghsaosv
CVE-2018-11385HIGH≥ 2.7.0, < 2.7.48≥ 2.8.0, < 2.8.41+3 more2022-05-14
CVE-2018-11385 [HIGH] CWE-384 Symfony Session Fixation Vulnerability
Symfony Session Fixation Vulnerability
An issue was discovered in the Security component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. A session fixation vulnerability within the "Guard" login feature may allow an attacker to impersonate a victim towards the web application if the session id value was previously known to the attacker.
ghsaosv
CVE-2018-11406HIGH≥ 2.7.0, < 2.7.48≥ 2.8.0, < 2.8.41+3 more2022-05-14
CVE-2018-11406 [HIGH] CWE-352 Symfony CSRF Token Fixation
Symfony CSRF Token Fixation
An issue was discovered in the Security component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. By default, a user's session is invalidated when the user is logged out. This behavior can be disabled through the invalidate_session option. In this case, CSRF tokens were not erased during logout which allowed for CSRF token fixation.
ghsaosv
CVE-2017-16652MEDIUM≥ 2.7.0, < 2.7.38≥ 2.8.0, < 2.8.31+2 more2022-05-14
CVE-2017-16652 [MEDIUM] CWE-601 Symfony Open Redirect
Symfony Open Redirect
An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. `DefaultAuthenticationSuccessHandler` or `DefaultAuthenticationFailureHandler` takes the content of the `_target_path` parameter and generates a redirect response, but no check is performed on the path, which could be an absolute URL to an external domain. This Open redirect vulnerability can be exp
ghsaosv
CVE-2018-19790MEDIUM≥ 2.7.38, < 2.7.50≥ 2.8.0, < 2.8.49+4 more2022-05-14
CVE-2018-19790 [MEDIUM] CWE-601 Symfony Open Redirect
Symfony Open Redirect
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.
ghsaosv
CVE-2015-8124LOW≥ 2.3.0, < 2.3.35≥ 2.4.0, < 2.6.12+1 more2022-05-14
CVE-2015-8124 [LOW] CWE-384 Symfony Session Fixation Vulnerability
Symfony Session Fixation Vulnerability
A session fixation vulnerability within the "Remember Me" login feature allows an attacker to impersonate the victim towards the web application if the session id value was previously known to the attacker. This issue has been fixed in Symfony 2.3.35, 2.6.12, and 2.7.7. Note that no fixes are provided for Symfony 2.4 and 2.5 as they are not maintained anymore. Symfony 2.8 and 3.0 haven't be
ghsaosv
CVE-2017-16653MEDIUM≥ 2.7.0, < 2.7.38≥ 2.8.0, < 2.8.31+2 more2022-05-13
CVE-2017-16653 [MEDIUM] CWE-352 Symfony CSRF Vulnerability
Symfony CSRF Vulnerability
An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The current implementation of CSRF protection in Symfony (Version >=2) does not use different tokens for HTTP and HTTPS; therefore the token is subject to MITM attacks on HTTP and can then be used in an HTTPS context to do CSRF attacks.
ghsaosv
CVE-2021-21424MEDIUM≥ 5.0.0, < 5.2.8≥ 2.8.0, < 3.4.49+1 more2021-05-13
CVE-2021-21424 [MEDIUM] CWE-200 Prevent user enumeration using Guard or the new Authenticator-based Security
Prevent user enumeration using Guard or the new Authenticator-based Security
Description
The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authenticati
ghsaosv
CVE-2020-5275HIGH≥ 4.4.0, < 4.4.7≥ 5.0.0, < 5.0.72020-03-30
CVE-2020-5275 [HIGH] CWE-285 Firewall configured with unanimous strategy was not actually unanimous in Symfony
Firewall configured with unanimous strategy was not actually unanimous in Symfony
Description
On Symfony before 4.4.0, when a `Firewall` checks an access control rule (using the unanimous strategy), it iterates over all rule attributes and grant access only if *all* calls to the `accessDecisionManager` decide to grant access.
As of Symfony 4.4.0, a bug was introduced that prevents th
ghsaosv
CVE-2019-10911HIGH≥ 2.7.0, < 2.7.51≥ 2.8.0, < 2.8.50+3 more2020-02-12
CVE-2019-10911 [HIGH] CWE-200 Improper authentication in Symfony
Improper authentication in Symfony
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security.
ghsaosv