First published: Wed May 12 2021(Updated: )
CVE-2021-21424: Prevent user enumeration via response content in authentication mechanisms
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/symfony/symfony | >=2.8.0<3.0.0>=3.0.0<3.1.0>=3.1.0<3.2.0>=3.2.0<3.3.0>=3.3.0<3.4.0>=3.4.0<3.4.49>=4.0.0<4.1.0>=4.1.0<4.2.0>=4.2.0<4.3.0>=4.3.0<4.4.0>=4.4.0<4.4.24>=5.0.0<5.1.0>=5.1.0<5.2.0>=5.2.0<5.2.9 | |
composer/lexik/jwt-authentication-bundle | >=2.0.0<2.1.0>=2.1.0<2.2.0>=2.2.0<2.3.0>=2.3.0<2.4.0>=2.4.0<2.5.0>=2.5.0<2.6.0>=2.6.0<2.7.0>=2.7.0<2.8.0>=2.8.0<2.9.0>=2.9.0<2.10.0>=2.10.0<2.10.7>=2.11.0<2.11.3 | |
composer/symfony/security | >=2.8.0<3.0.0>=3.0.0<3.1.0>=3.1.0<3.2.0>=3.2.0<3.3.0>=3.3.0<3.4.0>=3.4.0<3.4.49>=4.0.0<4.1.0>=4.1.0<4.2.0>=4.2.0<4.3.0>=4.3.0<4.4.0>=4.4.0<4.4.24 | |
composer/symfony/security-core | >=2.8.0<3.0.0>=3.0.0<3.1.0>=3.1.0<3.2.0>=3.2.0<3.3.0>=3.3.0<3.4.0>=3.4.0<3.4.49>=4.0.0<4.1.0>=4.1.0<4.2.0>=4.2.0<4.3.0>=4.3.0<4.4.0>=4.4.0<4.4.24>=5.0.0<5.1.0>=5.1.0<5.2.0>=5.2.0<5.2.9 | |
composer/symfony/security-guard | >=2.8.0<3.0.0>=3.0.0<3.1.0>=3.1.0<3.2.0>=3.2.0<3.3.0>=3.3.0<3.4.0>=3.4.0<3.4.48>=4.0.0<4.1.0>=4.1.0<4.2.0>=4.2.0<4.3.0>=4.3.0<4.4.0>=4.4.0<4.4.23>=5.0.0<5.1.0>=5.1.0<5.2.0>=5.2.0<5.2.8 | |
composer/symfony/maker-bundle | >=1.27.0<1.28.0>=1.28.0<1.29.0>=1.29.0<1.29.2>=1.30.0<1.31.0>=1.31.0<1.31.1 | |
composer/symfony/security-http | >=5.1.0<5.2.0>=5.2.0<5.2.8 | |
SensioLabs Symfony | >=2.8.0<3.4.48 | |
SensioLabs Symfony | >=4.0.0<4.4.23 | |
SensioLabs Symfony | >=5.0.0<5.2.8 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
composer/symfony/symfony | >=5.0.0<5.2.9 | 5.2.9 |
composer/symfony/symfony | >=4.0.0<4.4.24 | 4.4.24 |
composer/symfony/symfony | >=2.8.0<3.4.49 | 3.4.49 |
composer/symfony/security | >=4.0.0<4.4.24 | 4.4.24 |
composer/symfony/security | >=2.8.0<3.4.49 | 3.4.49 |
composer/symfony/security-http | >=5.1.0<5.2.8 | 5.2.8 |
composer/symfony/maker-bundle | >=1.30.0<1.31.1 | 1.31.1 |
composer/symfony/maker-bundle | >=1.27.0<1.29.2 | 1.29.2 |
composer/lexik/jwt-authentication-bundle | >=2.11.0<2.11.3 | 2.11.3 |
composer/lexik/jwt-authentication-bundle | >=2.0.0<2.10.7 | 2.10.7 |
composer/symfony/security-core | >=5.0.0<5.2.8 | 5.2.8 |
composer/symfony/security-core | >=4.0.0<4.4.23 | 4.4.23 |
composer/symfony/security-core | >=2.8.0<3.4.48 | 3.4.48 |
composer/symfony/security-guard | >=5.0.0<5.2.8 | 5.2.8 |
composer/symfony/security-guard | >=4.0.0<4.4.23 | 4.4.23 |
composer/symfony/security-guard | >=2.8.0<3.4.48 | 3.4.48 |
composer/symfony/security | >=5.0.0<5.2.8 | 5.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21424 is a vulnerability in Symfony, a PHP framework for web and console applications, that allows user enumeration via response content in authentication mechanisms.
The severity of CVE-2021-21424 is medium, with a severity value of 5.3.
The versions of Symfony affected by CVE-2021-21424 are between 2.8.0 and 3.4.48, between 4.0.0 and 4.4.23, and between 5.0.0 and 5.2.8.
To fix CVE-2021-21424, upgrade Symfony to a version that is not affected, such as 3.4.49, 4.4.24, or 5.2.9.
You can find more information about CVE-2021-21424 on the Symfony website and the GitHub pages for the Symfony project and security advisories.