gsd-2021-41268
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Symfony/SecurityBundle is the security system for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Since the rework of the Remember me cookie in version 5.3.0, the cookie is not invalidated when the user changes their password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Starting with version 5.3.12, Symfony makes the password part of the signature by default. In that way, when the password changes, then the cookie is not valid anymore.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-41268", "description": "Symfony/SecurityBundle is the security system for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Since the rework of the Remember me cookie in version 5.3.0, the cookie is not invalidated when the user changes their password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Starting with version 5.3.12, Symfony makes the password part of the signature by default. In that way, when the password changes, then the cookie is not valid anymore.", "id": "GSD-2021-41268" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-41268" ], "details": "Symfony/SecurityBundle is the security system for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Since the rework of the Remember me cookie in version 5.3.0, the cookie is not invalidated when the user changes their password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Starting with version 5.3.12, Symfony makes the password part of the signature by default. In that way, when the password changes, then the cookie is not valid anymore.", "id": "GSD-2021-41268", "modified": "2023-12-13T01:23:27.577612Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41268", "STATE": "PUBLIC", "TITLE": "Cookie persistence in Symfony" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "symfony", "version": { "version_data": [ { "version_value": "\u003e= 5.3.0, \u003c 5.3.12" } ] } } ] }, "vendor_name": "symfony" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symfony/SecurityBundle is the security system for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Since the rework of the Remember me cookie in version 5.3.0, the cookie is not invalidated when the user changes their password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Starting with version 5.3.12, Symfony makes the password part of the signature by default. In that way, when the password changes, then the cookie is not valid anymore." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-384: Session Fixation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr", "refsource": "CONFIRM", "url": "https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr" }, { "name": "https://github.com/symfony/symfony/pull/44243", "refsource": "MISC", "url": "https://github.com/symfony/symfony/pull/44243" }, { "name": "https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc", "refsource": "MISC", "url": "https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc" }, { "name": "https://github.com/symfony/symfony/releases/tag/v5.3.12", "refsource": "MISC", "url": "https://github.com/symfony/symfony/releases/tag/v5.3.12" } ] }, "source": { "advisory": "GHSA-qw36-p97w-vcqr", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=5.3.0,\u003c5.3.12", "affected_versions": "All versions starting from 5.3.0 before 5.3.12", "cvss_v2": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-384", "CWE-937" ], "date": "2021-11-30", "description": "Symfony/SecurityBundle is the security system for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Since the rework of the Remember me cookie, the cookie is not invalidated when the user changes their password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Starting with, Symfony makes the password part of the signature by default. In that way, when the password changes, then the cookie is not valid anymore.", "fixed_versions": [ "5.3.12" ], "identifier": "CVE-2021-41268", "identifiers": [ "CVE-2021-41268", "GHSA-qw36-p97w-vcqr" ], "not_impacted": "All versions before 5.3.0, all versions starting from 5.3.12", "package_slug": "packagist/symfony/security-bundle", "pubdate": "2021-11-24", "solution": "Upgrade to version 5.3.12 or above.", "title": "Session Fixation", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-41268", "https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr", "https://github.com/symfony/symfony/releases/tag/v5.3.12", "https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc", "https://github.com/symfony/symfony/pull/44243" ], "uuid": "739d6516-9c03-45b7-9819-2bf380add788" }, { "affected_range": "\u003e=5.3.0,\u003c5.3.12", "affected_versions": "All versions starting from 5.3.0 before 5.3.12", "cvss_v2": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-384", "CWE-937" ], "date": "2021-11-30", "description": "`Symfony/SecurityBundle` is the security system for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Since the rework of the Remember me cookie, the cookie is not invalidated when the user changes their password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Starting with, Symfony makes the password part of the signature by default. In that way, when the password changes, then the cookie is not valid anymore.", "fixed_versions": [ "5.4.0" ], "identifier": "CVE-2021-41268", "identifiers": [ "CVE-2021-41268", "GHSA-qw36-p97w-vcqr" ], "not_impacted": "All versions before 5.3.0, all versions starting from 5.3.12", "package_slug": "packagist/symfony/security-http", "pubdate": "2021-11-24", "solution": "Upgrade to version 5.4.0 or above.", "title": "Session Fixation", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-41268", "https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr", "https://github.com/symfony/symfony/releases/tag/v5.3.12", "https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc", "https://github.com/symfony/symfony/pull/44243" ], "uuid": "62f34541-7dd3-4218-aadc-8aaeb07d779e" }, { "affected_range": "\u003e=5.3.0,\u003c5.3.12", "affected_versions": "All versions starting from 5.3.0 before 5.3.12", "cvss_v2": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-384", "CWE-937" ], "date": "2021-11-30", "description": "`Symfony/SecurityBundle` is the security system for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Since the rework of the Remember me cookie, the cookie is not invalidated when the user changes their password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Starting with, Symfony makes the password part of the signature by default. In that way, when the password changes, then the cookie is not valid anymore.", "fixed_versions": [ "5.3.12" ], "identifier": "CVE-2021-41268", "identifiers": [ "CVE-2021-41268", "GHSA-qw36-p97w-vcqr" ], "not_impacted": "All versions starting from 5.3.12", "package_slug": "packagist/symfony/security", "pubdate": "2021-11-24", "solution": "Upgrade to version 5.3.12 or above.", "title": "Session Fixation", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-41268", "https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr", "https://github.com/symfony/symfony/releases/tag/v5.3.12", "https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc", "https://github.com/symfony/symfony/pull/44243" ], "uuid": "49fd3bd9-30b2-4c96-8075-3afb5af43bee" }, { "affected_range": "\u003e=5.3.0,\u003c5.3.12", "affected_versions": "All versions starting from 5.3.0 before 5.3.12", "cvss_v2": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-384", "CWE-937" ], "date": "2021-11-30", "description": "`Symfony/SecurityBundle` is the security system for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Since the rework of the Remember me cookie, the cookie is not invalidated when the user changes their password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Symfony makes the password part of the signature by default. In that way, when the password changes, then the cookie is not valid anymore.", "fixed_versions": [ "5.3.12" ], "identifier": "CVE-2021-41268", "identifiers": [ "CVE-2021-41268", "GHSA-qw36-p97w-vcqr" ], "not_impacted": "All versions before 5.3.0, all versions starting from 5.3.12", "package_slug": "packagist/symfony/symfony", "pubdate": "2021-11-24", "solution": "Upgrade to version 5.3.12 or above.", "title": "Session Fixation", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-41268", "https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr", "https://github.com/symfony/symfony/releases/tag/v5.3.12", "https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc", "https://github.com/symfony/symfony/pull/44243" ], "uuid": "e685b69d-f44f-4953-8b85-a37009d4ece3" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.3.12", "versionStartIncluding": "5.3.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41268" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Symfony/SecurityBundle is the security system for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Since the rework of the Remember me cookie in version 5.3.0, the cookie is not invalidated when the user changes their password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Starting with version 5.3.12, Symfony makes the password part of the signature by default. In that way, when the password changes, then the cookie is not valid anymore." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-384" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr" }, { "name": "https://github.com/symfony/symfony/releases/tag/v5.3.12", "refsource": "MISC", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/symfony/symfony/releases/tag/v5.3.12" }, { "name": "https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc" }, { "name": "https://github.com/symfony/symfony/pull/44243", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/symfony/symfony/pull/44243" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2021-11-30T20:04Z", "publishedDate": "2021-11-24T19:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.