#VU16615 Open redirect in Symfony - CVE-2018-19790
Published: December 19, 2018
Vulnerability identifier: #VU16615
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-19790
CWE-ID: CWE-601
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Symfony
Symfony
Software vendor:
SensioLabs
SensioLabs
Description
The vulnerability allows a remote unauthenticated attacker to redirect the target user to external websites.
The weakness exists due to improper sanitization of user-supplied data. A remote attacker can use backslashes in the `_failure_path` input field of login forms, work around the redirection target restrictions and effectively redirect the user to any domain after login.
The weakness exists due to improper sanitization of user-supplied data. A remote attacker can use backslashes in the `_failure_path` input field of login forms, work around the redirection target restrictions and effectively redirect the user to any domain after login.
Remediation
The vulnerability has been fixed in the versions 2.7.50, 2.8.49, 3.4.20, 4.0.15, 4.1.9 and 4.2.1.