First published: Wed Nov 13 2024(Updated: )
### Description When consuming a persisted remember-me cookie, Symfony does not check if the username persisted in the database matches the username attached with the cookie, leading to authentication bypass. ### Resolution The `PersistentRememberMeHandler` class now ensures the submitted username is the cookie owner. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/81354d392c5f0b7a52bcbd729d6f82501e94135a) for branch 5.4. ### Credits We would like to thank Moritz Rauch - Pentryx AG for reporting the issue and Jérémy Derussé for providing the fix.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/symfony/security-http | >=7.0.0-BETA1<7.1.8 | 7.1.8 |
composer/symfony/security-http | >=6.0.0-BETA1<6.4.15 | 6.4.15 |
composer/symfony/security-http | >=5.3.0<5.4.47 | 5.4.47 |
debian/symfony | <=4.4.19+dfsg-2+deb11u6 | 5.4.23+dfsg-1+deb12u4 6.4.18+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51996 is classified as a high severity vulnerability due to its potential for authentication bypass.
To resolve CVE-2024-51996, upgrade the symfony/security-http package to version 7.1.8, 6.4.15, or 5.4.47.
CVE-2024-51996 is caused by Symfony not verifying if the username in a persisted remember-me cookie matches the username in the database.
Versions of Symfony between 7.0.0-BETA1 and 7.1.8, 6.0.0-BETA1 and 6.4.15, and 5.3.0 and 5.4.47 are affected by CVE-2024-51996.
Yes, CVE-2024-51996 is considered persistent as it affects the functioning of persisted remember-me cookies in Symfony.