Open redirect in Symfony - CVE-2018-19790
Published: December 19, 2018
Vulnerability identifier: #VU16615
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-19790
CWE-ID: CWE-601
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: SensioLabs
Affected software:
Symfony
Symfony
Detailed vulnerability description
The vulnerability allows a remote unauthenticated attacker to redirect the target user to external websites.
The weakness exists due to improper sanitization of user-supplied data. A remote attacker can use backslashes in the `_failure_path` input field of login forms, work around the redirection target restrictions and effectively redirect the user to any domain after login.
The weakness exists due to improper sanitization of user-supplied data. A remote attacker can use backslashes in the `_failure_path` input field of login forms, work around the redirection target restrictions and effectively redirect the user to any domain after login.
How to mitigate CVE-2018-19790
The vulnerability has been fixed in the versions 2.7.50, 2.8.49, 3.4.20, 4.0.15, 4.1.9 and 4.2.1.