Cross-site Request Forgery (CSRF) Affecting symfony/security-bundle package, versions >=2.0.0, <4.4.50>=5.0.0, <5.4.20>=6.0.0, <6.0.20>=6.1.0, <6.1.12>=6.2.0, <6.2.6


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.23% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-SYMFONYSECURITYBUNDLE-3262973
  • published1 Feb 2023
  • disclosed1 Feb 2023
  • creditMarco Squarcina

Introduced: 1 Feb 2023

CVE-2022-24895  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade symfony/security-bundle to version 4.4.50, 5.4.20, 6.0.20, 6.1.12, 6.2.6 or higher.

Overview

symfony/security-bundle is a security bundle for Symfony.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) such that the library regenerates the session ID upon user login while preserving all other session attributes by default. The implemented logic does not clear CSRF tokens. As a result, same-site attackers may be able to bypass the CSRF protection mechanism by executing a session-fixation attack.

CVSS Scores

version 3.1