First published: Tue Nov 06 2018(Updated: )
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/symfony/symfony | >=2.7.38<2.7.50>=2.8.0<2.8.49>=3.0.0<3.1.0>=3.1.0<3.2.0>=3.2.0<3.3.0>=3.3.0<3.4.0>=3.4.0<3.4.20>=4.0.0<4.0.15>=4.1.0<4.1.9>=4.2.0<4.2.1 | |
composer/symfony/security | >=2.7.38<2.7.50>=2.8.0<2.8.49>=3.0.0<3.1.0>=3.1.0<3.2.0>=3.2.0<3.3.0>=3.3.0<3.4.0>=3.4.0<3.4.19>=4.0.0<4.0.15>=4.1.0<4.1.9>=4.2.0<4.2.1 | |
composer/symfony/security-http | >=2.7.38<2.7.50>=2.8.0<2.8.49>=3.0.0<3.1.0>=3.1.0<3.2.0>=3.2.0<3.3.0>=3.3.0<3.4.0>=3.4.0<3.4.20>=4.0.0<4.0.15>=4.1.0<4.1.9>=4.2.0<4.2.1 | |
SensioLabs Symfony | >=2.7.0<2.7.50 | |
SensioLabs Symfony | >=2.8.0<2.8.49 | |
SensioLabs Symfony | >=3.0.0<3.4.20 | |
SensioLabs Symfony | >=4.0.0<4.0.15 | |
SensioLabs Symfony | >=4.1.0<4.1.9 | |
SensioLabs Symfony | >=4.2.0<4.2.1 | |
Fedoraproject Fedora | =28 | |
Debian Debian Linux | =8.0 | |
debian/symfony | 3.4.22+dfsg-2+deb10u1 3.4.22+dfsg-2+deb10u2 4.4.19+dfsg-2+deb11u3 5.4.23+dfsg-1 5.4.29+dfsg-1 5.4.30+dfsg-1 | |
composer/symfony/symfony | >=4.1.0<4.1.9 | 4.1.9 |
composer/symfony/symfony | >=4.0.0<4.0.15 | 4.0.15 |
composer/symfony/symfony | >=3.0.0<3.4.20 | 3.4.20 |
composer/symfony/symfony | >=2.8.0<2.8.49 | 2.8.49 |
composer/symfony/symfony | >=2.7.38<2.7.50 | 2.7.50 |
composer/symfony/security | >=4.2.0<4.2.1 | 4.2.1 |
composer/symfony/security | >=4.1.0<4.1.9 | 4.1.9 |
composer/symfony/security | >=4.0.0<4.0.15 | 4.0.15 |
composer/symfony/security | >=3.0.0<3.4.19 | 3.4.19 |
composer/symfony/security | >=2.8.0<2.8.49 | 2.8.49 |
composer/symfony/security | >=2.7.38<2.7.50 | 2.7.50 |
composer/symfony/security-http | >=4.2.0<4.2.1 | 4.2.1 |
composer/symfony/security-http | >=4.1.0<4.1.9 | 4.1.9 |
composer/symfony/security-http | >=4.0.0<4.0.15 | 4.0.15 |
composer/symfony/security-http | >=3.0.0<3.4.20 | 3.4.20 |
composer/symfony/security-http | >=2.8.0<2.8.49 | 2.8.49 |
composer/symfony/security-http | >=2.7.38<2.7.50 | 2.7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19790 is an open redirect vulnerability in Symfony.
CVE-2018-19790 has a severity rating of 6.1 (medium).
Symfony versions 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1 are affected by CVE-2018-19790.
An attacker can exploit CVE-2018-19790 by using backslashes in the _failure_path input field of login forms to bypass the redirection target restrictions.
You can find more information about CVE-2018-19790 at the following links: [Symfony Advisory](https://symfony.com/cve-2018-19790), [Symfony Blog](https://symfony.com/blog/cve-2018-19790-open-redirect-vulnerability-when-using-security-http), [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2018-19790)