Access Control Bypass Affecting symfony/symfony package, versions >=2.7.0, <2.7.51 >=2.8.0, <2.8.50 >=4.0.0, <4.1.0 >=3.4.0, <3.4.26 >=3.1.0, <3.2.0 >=4.1.0, <4.1.12 >=3.0.0, <3.1.0 >=3.3.0, <3.4.0 >=3.2.0, <3.3.0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-SYMFONYSYMFONY-174499
- published 24 Apr 2019
- disclosed 17 Apr 2019
- credit Jon Cave
Introduced: 17 Apr 2019
CVE-2019-10911 Open this link in a new tabHow to fix?
Upgrade symfony/symfony
to version 2.7.51, 2.8.50, 4.1.0, 3.4.26, 3.2.0, 4.1.12, 3.1.0, 3.4.0, 3.3.0 or higher.
Overview
symfony/symfony is a PHP framework for web applications and a set of reusable PHP components.
Affected versions of this package are vulnerable to Access Control Bypass. The generateCookieHash
function used to create a user's remember me cookie does not contain a delimiter during token generation. As such, an attacker could modify the remember me cookie and authenticate as a different user. This attack is only possible if the remember me functionality is enabled and the two users share a password hash or if the password hashes (e.g. UserInterface::getPassword()
) are null for all users (which is valid if passwords are checked by an external system, e.g. an SSO).