Access Control Bypass Affecting symfony/security-http package, versions >=4.2.0, <4.2.7


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.27% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-SYMFONYSECURITYHTTP-174491
  • published24 Apr 2019
  • disclosed17 Apr 2019
  • creditJon Cave

Introduced: 17 Apr 2019

CVE-2019-10911  (opens in a new tab)
CWE-288  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade symfony/security-http to version 4.2.7 or higher.

Overview

symfony/security-http is a provides an infrastructure for sophisticated authorization systems, which makes it possible to easily separate the actual authorization logic from so called user providers that hold the users credentials.

Affected versions of this package are vulnerable to Access Control Bypass. The generateCookieHash function used to create a user's remember me cookie does not contain a delimiter during token generation. As such, an attacker could modify the remember me cookie and authenticate as a different user. This attack is only possible if the remember me functionality is enabled and the two users share a password hash or if the password hashes (e.g. UserInterface::getPassword()) are null for all users (which is valid if passwords are checked by an external system, e.g. an SSO).

CVSS Scores

version 3.1