Lucene search

K
symfonySymfony SASSYMFONY:CVE-2013-5750-SECURITY-ISSUE-IN-FOSUSERBUNDLE-LOGIN-FORM
HistorySep 23, 2013 - 12:00 a.m.

CVE-2013-5750: Security issue in FOSUserBundle login form

2013-09-2300:00:00
Symfony SAS
symfony.com
12

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

5.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.2%

Django recently released a new version of their framework to address a possible DOS attack when an attacker uses a very long password on a login form.

One of the best practices for passwords is to store a hash of the password instead of the raw value. In Symfony, the encoders are responsible for the hash creation (when a user creates an account) and verification (when a user tries to log in).

For most built-in encoders, the time is takes to compute a hash increases significantly with the length of the password. If an attacker submits random large passwords repeatedly, Symfony will be forced to do expensive computation.

All encoders are not vulnerable, but the recommended ones are. For information, here are the times it takes to encode a password of 1 million characters (lines with a * denotes the built-in encoder default configurations):

Encoder encodePassword()
BCrypt (cost <14) <1s
BCrypt (cost 18) 20s
BCrypt (cost 20) 78s
Pbkdf2* (1,000 it) 6s
Plaintext* <1s
MessageDigest* (5,000 it) 30s
Pbkdf2 (10,000 it) 55s

As you can see, for the Pbkdf2 encoder, it takes almost one minute when the number of iterations is set to 10,000 (which is the number of iterations used in iOS 7.)

Symfony does not come with a default login/password form, but FOSUserBundle does. FOSUserBundle is vulnerable to this attack as there is no password length maximum in the validation for the user password field. A new version of FOSUserBundle (1.3.3) has just been released to fix this issue by adding a maximum length for a valid password (set to 4096 by default). If your website uses a login form without using FOSUserBundle, check that you set a max length validator for the password.

To better protect Symfony developers, Symfony 2.4 adds a hard limit of 4096 characters for the maximum length of a password passed to the encodePassword() and isPasswordValid() methods (you need to call $this-&gt;checkPasswordLength($raw); yourself if you have using a custom encoder). So, you need to set the maximum length of your validator to the same or lower limit.

We are also going to update the documentation with updated best practices about passwords and encoders.

Log in to add a reaction to this post

add a reaction ❤️ 👍 🚀

Published in #Security Advisories

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

5.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.2%

Related for SYMFONY:CVE-2013-5750-SECURITY-ISSUE-IN-FOSUSERBUNDLE-LOGIN-FORM