#VU31280 Open redirect in Symfony - CVE-2017-16652

 

#VU31280 Open redirect in Symfony - CVE-2017-16652

Published: June 13, 2018 / Updated: July 17, 2020


Vulnerability identifier: #VU31280
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-16652
CWE-ID: CWE-601
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Symfony
Software vendor:
SensioLabs

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. DefaultAuthenticationSuccessHandler or DefaultAuthenticationFailureHandler takes the content of the _target_path parameter and generates a redirect response, but no check is performed on the path, which could be an absolute URL to an external domain. This Open redirect vulnerability can be exploited for example to mount effective phishing attacks.


Remediation

Install update from vendor's website.

External links