Timing Attack Affecting symfony/http-kernel package, versions >=2.8.0, <2.8.52>=3.4.0, <3.4.35>=4.2.0, <4.2.12>=4.3.0, <4.3.8


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.18% (86th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-SYMFONYHTTPKERNEL-535377
  • published22 Nov 2019
  • disclosed21 Nov 2019
  • creditUnknown

Introduced: 21 Nov 2019

CVE-2019-18887  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade symfony/http-kernel to version 2.8.52, 3.4.35, 4.2.12, 4.3.8 or higher.

Overview

symfony/http-kernel is a Symfony component that provides a structured process for converting a Request into a Response.

Affected versions of this package are vulnerable to Timing Attack. When checking the signature of an URI (an ESI fragment URL for instance), the URISigner does not use a constant time string comparison function, resulting in a potential remote timing attack vulnerability.

CVSS Scores

version 3.1