Cross-site Request Forgery (CSRF) Affecting symfony/security-bundle package, versions >=2.0.0, <4.4.50 >=5.0.0, <5.4.20 >=6.0.0, <6.0.20 >=6.1.0, <6.1.12 >=6.2.0, <6.2.6


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.2% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PHP-SYMFONYSECURITYBUNDLE-3262973
  • published 1 Feb 2023
  • disclosed 1 Feb 2023
  • credit Marco Squarcina

How to fix?

Upgrade symfony/security-bundle to version 4.4.50, 5.4.20, 6.0.20, 6.1.12, 6.2.6 or higher.

Overview

symfony/security-bundle is a security bundle for Symfony.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) such that the library regenerates the session ID upon user login while preserving all other session attributes by default. The implemented logic does not clear CSRF tokens. As a result, same-site attackers may be able to bypass the CSRF protection mechanism by executing a session-fixation attack.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
6.3 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    Required
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    Low
  • Availability (A)
    Low
Expand this section

NVD

8.8 high