Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade symfony/symfony
to version 2.7.51, 2.8.50, 4.1.0, 3.4.26, 3.2.0, 4.1.12, 3.1.0, 3.4.0, 3.3.0 or higher.
symfony/symfony is a PHP framework for web applications and a set of reusable PHP components.
Affected versions of this package are vulnerable to Access Control Bypass. The generateCookieHash
function used to create a user's remember me cookie does not contain a delimiter during token generation. As such, an attacker could modify the remember me cookie and authenticate as a different user. This attack is only possible if the remember me functionality is enabled and the two users share a password hash or if the password hashes (e.g. UserInterface::getPassword()
) are null for all users (which is valid if passwords are checked by an external system, e.g. an SSO).