Lucene search

K
cve[email protected]CVE-2022-24895
HistoryFeb 03, 2023 - 10:15 p.m.

CVE-2022-24895

2023-02-0322:15:11
CWE-384
CWE-613
web.nvd.nist.gov
60
symfony
php
framework
web
console
application
session fixation
vulnerability
cve-2022-24895

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.002

Percentile

54.4%

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. This issue has been fixed in the 4.4 branch.

Affected configurations

Vulners
NVD
Node
symfonytwigRange2.0.04.4.50
OR
symfonytwigRange5.0.05.4.20
OR
symfonytwigRange6.0.06.0.20
OR
symfonytwigRange6.1.06.1.12
OR
symfonytwigRange6.2.06.2.6
VendorProductVersionCPE
symfonytwig*cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*
symfonytwig*cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*
symfonytwig*cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*
symfonytwig*cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*
symfonytwig*cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "symfony",
    "product": "symfony",
    "versions": [
      {
        "version": ">= 2.0.0, < 4.4.50",
        "status": "affected"
      },
      {
        "version": ">= 5.0.0, < 5.4.20",
        "status": "affected"
      },
      {
        "version": ">= 6.0.0, < 6.0.20",
        "status": "affected"
      },
      {
        "version": ">= 6.1.0, < 6.1.12",
        "status": "affected"
      },
      {
        "version": ">= 6.2.0, < 6.2.6",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.002

Percentile

54.4%