Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-16652


An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. DefaultAuthenticationSuccessHandler or DefaultAuthenticationFailureHandler takes the content of the _target_path parameter and generates a redirect response, but no check is performed on the path, which could be an absolute URL to an external domain. This Open redirect vulnerability can be exploited for example to mount effective phishing attacks.


Published

2018-06-13T16:29:00.267

Last Modified

2024-11-21T03:16:46.070

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 6.1 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-601

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sensiolabs symfony < 2.7.38 Yes
Application sensiolabs symfony < 2.8.31 Yes
Application sensiolabs symfony < 3.2.14 Yes
Application sensiolabs symfony < 3.3.13 Yes
Operating System debian debian_linux 8.0 Yes

References