logo

CVE-2018-19790 symfony/security

Package

Manager: composer
Name: symfony/security
Vulnerable Version: >=2.7.38 <2.7.50 || >=2.8.0 <2.8.49 || >=3.0.0 <3.4.19 || >=4.0.0 <4.0.15 || >=4.1.0 <4.1.9 || >=4.2.0 <4.2.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

EPSS: 0.00474 pctl0.63816

Details

Symfony Open Redirect An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.

Metadata

Created: 2022-05-14T01:04:20Z
Modified: 2024-04-25T22:12:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-89r2-5g34-2g47/GHSA-89r2-5g34-2g47.json
CWE IDs: ["CWE-601"]
Alternative ID: GHSA-89r2-5g34-2g47
Finding: F156
Auto approve: 1