Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-24895
HistoryFeb 03, 2023 - 9:45 p.m.

CVE-2022-24895 Symfony vulnerable to Session Fixation of CSRF tokens

2023-02-0321:45:26
CWE-384
GitHub_M
www.cve.org
7
symfony
php
session fixation
csrf
4.4 branch

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

AI Score

8.9

Confidence

High

EPSS

0.002

Percentile

54.0%

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. This issue has been fixed in the 4.4 branch.

CNA Affected

[
  {
    "vendor": "symfony",
    "product": "symfony",
    "versions": [
      {
        "version": ">= 2.0.0, < 4.4.50",
        "status": "affected"
      },
      {
        "version": ">= 5.0.0, < 5.4.20",
        "status": "affected"
      },
      {
        "version": ">= 6.0.0, < 6.0.20",
        "status": "affected"
      },
      {
        "version": ">= 6.1.0, < 6.1.12",
        "status": "affected"
      },
      {
        "version": ">= 6.2.0, < 6.2.6",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

AI Score

8.9

Confidence

High

EPSS

0.002

Percentile

54.0%