Lucene search

K
cve[email protected]CVE-2022-24895
HistoryFeb 03, 2023 - 10:15 p.m.

CVE-2022-24895

2023-02-0322:15:11
CWE-613
CWE-384
web.nvd.nist.gov
59
symfony
php
framework
web
console
application
session fixation
vulnerability
cve-2022-24895

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.6%

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. This issue has been fixed in the 4.4 branch.

Affected configurations

Vulners
NVD
Node
symfonytwigRange2.0.04.4.50
OR
symfonytwigRange5.0.05.4.20
OR
symfonytwigRange6.0.06.0.20
OR
symfonytwigRange6.1.06.1.12
OR
symfonytwigRange6.2.06.2.6
VendorProductVersionCPE
symfonytwig*cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*
symfonytwig*cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*
symfonytwig*cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*
symfonytwig*cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*
symfonytwig*cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "symfony",
    "product": "symfony",
    "versions": [
      {
        "version": ">= 2.0.0, < 4.4.50",
        "status": "affected"
      },
      {
        "version": ">= 5.0.0, < 5.4.20",
        "status": "affected"
      },
      {
        "version": ">= 6.0.0, < 6.0.20",
        "status": "affected"
      },
      {
        "version": ">= 6.1.0, < 6.1.12",
        "status": "affected"
      },
      {
        "version": ">= 6.2.0, < 6.2.6",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.6%