Access Control Bypass Affecting symfony/security package, versions >=4.2.0, <4.2.7


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.27% (68th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-SYMFONYSECURITY-174503
  • published24 Apr 2019
  • disclosed17 Apr 2019
  • creditJon Cave

Introduced: 17 Apr 2019

CVE-2019-10911  (opens in a new tab)
CWE-288  (opens in a new tab)

How to fix?

Upgrade symfony/security to version 4.2.7 or higher.

Overview

symfony/security is a security component which provides a complete security system for a symfony web application.

Affected versions of this package are vulnerable to Access Control Bypass. The generateCookieHash function used to create a user's remember me cookie does not contain a delimiter during token generation. As such, an attacker could modify the remember me cookie and authenticate as a different user. This attack is only possible if the remember me functionality is enabled and the two users share a password hash or if the password hashes (e.g. UserInterface::getPassword()) are null for all users (which is valid if passwords are checked by an external system, e.g. an SSO).

CVSS Scores

version 3.1