CVE-2023-46733 – symfony/security-http
Package
Manager: composer
Name: symfony/security-http
Vulnerable Version: >=5.4.21 <5.4.31 || >=6.2.7 <6.3.8
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0081 pctl0.73355
Details
Symfony possible session fixation vulnerability ### Description SessionStrategyListener does not always migrate the session after a successful login. It only migrate the session when the logged-in user identifier changes. In some use cases, the user identifier doesn't change between the verification phase and the successful login, while the token itself changes from one type (partially-authenticated) to another (fully-authenticated). When this happens, the session id should be regenerated to prevent possible session fixations. ### Resolution Symfony now checks the type of the token in addition to the user identifier before deciding whether the session id should be regenerated. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/dc356499d5ceb86f7cf2b4c7f032eca97061ed74) for branch 5.4. ### Credits We would like to thank Robert Meijers for reporting the issue and providing the fix.
Metadata
Created: 2023-11-12T15:51:54Z
Modified: 2023-11-12T15:51:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-m2wj-r6g3-fxfx/GHSA-m2wj-r6g3-fxfx.json
CWE IDs: ["CWE-384"]
Alternative ID: GHSA-m2wj-r6g3-fxfx
Finding: F280
Auto approve: 1