Improper authentication in Symfony - CVE-2019-10911

 

Improper authentication in Symfony - CVE-2019-10911

Published: April 17, 2019


Vulnerability identifier: #VU18298
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2019-10911
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: SensioLabs
Affected software:
Symfony

Detailed vulnerability description

The disclosed vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the way application handles values within HTTP cookies, related to session expiration time and username. A remote attacker can modify the remember me cookie value and authenticate as a different user.

This attack is only possible if remember me functionality is enabled and the two users share a password hash or the password hashes (e.g. UserInterface::getPassword()) are null for all users (which is valid if passwords are checked by an external system, e.g. an SSO).

How to mitigate CVE-2019-10911

Install updates from vendor's website.

Sources