Open Redirect Affecting symfony/security-http package, versions >=2.7.0, <2.7.50>=2.8.0, <2.8.49>=3.0.0, <3.4.20>=4.0.0, <4.0.15>=4.1.0, <4.1.9


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.54% (78th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-SYMFONYSECURITYHTTP-72661
  • published10 Dec 2018
  • disclosed7 Dec 2018
  • creditUnknown

Introduced: 7 Dec 2018

CVE-2018-19790  (opens in a new tab)
CWE-601  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade symfony/security-http to version 2.7.50, 2.8.49, 3.4.20, 4.0.15, 4.1.9 or higher.

Overview

symfony/security-http provides an infrastructure for sophisticated authorization systems, which makes it possible to easily separate the actual authorization logic from so called user providers that hold the users credentials.

Affected versions of this package are vulnerable to Open Redirect. An attacker could redirect the user to any domain after login while using backslashes in the _failure_path input field of login form.

CVSS Scores

version 3.1