#VU40728 Improper access control in Symfony - CVE-2015-4050

 

#VU40728 Improper access control in Symfony - CVE-2015-4050

Published: June 2, 2015 / Updated: August 9, 2020


Vulnerability identifier: #VU40728
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2015-4050
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Symfony
Software vendor:
SensioLabs

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

FragmentListener in the HttpKernel component in Symfony 2.3.19 through 2.3.28, 2.4.9 through 2.4.10, 2.5.4 through 2.5.11, and 2.6.0 through 2.6.7, when ESI or SSI support enabled, does not check if the _controller attribute is set, which allows remote attackers to bypass URL signing and security rules by including (1) no hash or (2) an invalid hash in a request to /_fragment.


Remediation

Install update from vendor's website.

External links