Access Control Bypass Affecting symfony/symfony package, versions >=2.7.0, <2.7.51>=2.8.0, <2.8.50>=4.0.0, <4.1.0>=3.4.0, <3.4.26>=3.1.0, <3.2.0>=4.1.0, <4.1.12>=3.0.0, <3.1.0>=3.3.0, <3.4.0>=3.2.0, <3.3.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.27% (68th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-SYMFONYSYMFONY-174499
  • published24 Apr 2019
  • disclosed17 Apr 2019
  • creditJon Cave

Introduced: 17 Apr 2019

CVE-2019-10911  (opens in a new tab)
CWE-288  (opens in a new tab)

How to fix?

Upgrade symfony/symfony to version 2.7.51, 2.8.50, 4.1.0, 3.4.26, 3.2.0, 4.1.12, 3.1.0, 3.4.0, 3.3.0 or higher.

Overview

symfony/symfony is a PHP framework for web applications and a set of reusable PHP components.

Affected versions of this package are vulnerable to Access Control Bypass. The generateCookieHash function used to create a user's remember me cookie does not contain a delimiter during token generation. As such, an attacker could modify the remember me cookie and authenticate as a different user. This attack is only possible if the remember me functionality is enabled and the two users share a password hash or if the password hashes (e.g. UserInterface::getPassword()) are null for all users (which is valid if passwords are checked by an external system, e.g. an SSO).

CVSS Scores

version 3.1