Lucene search

K
githubGitHub Advisory DatabaseGHSA-3GV2-29QC-V67M
HistoryFeb 01, 2023 - 6:48 p.m.

Symfony vulnerable to Session Fixation of CSRF tokens

2023-02-0118:48:06
CWE-384
CWE-613
GitHub Advisory Database
github.com
18
symfony
session fixation
csrf tokens
same-site attackers
patch
issue
report
fix

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

54.0%

Description

When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation.

Resolution

Symfony removes all CSRF tokens from the session on successful login.

The patch for this issue is available here for branch 4.4.

Credits

We would like to thank Marco Squarcina for reporting the issue and Nicolas Grekas for fixing it.

Affected configurations

Vulners
Node
symfonysymfonyRange<6.2.6
OR
symfonysymfonyRange<6.1.12
OR
symfonysymfonyRange<6.0.20
OR
symfonysymfonyRange<5.4.20
OR
symfonysymfonyRange2.0.0
OR
symfonysymfonyRange<4.4.50
OR
symfonysecurity_bundleRange<6.2.6
OR
symfonysecurity_bundleRange<6.1.12
OR
symfonysecurity_bundleRange<6.0.20
OR
symfonysecurity_bundleRange<5.4.20
OR
symfonysecurity_bundleRange2.0.0
OR
symfonysecurity_bundleRange<4.4.50

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

54.0%