CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
58.3%
When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation.
Symfony removes all CSRF tokens from the session on successful login.
The patch for this issue is available here for branch 4.4.
We would like to thank Marco Squarcina for reporting the issue and Nicolas Grekas for fixing it.
Vendor | Product | Version | CPE |
---|---|---|---|
symfony | symfony | * | cpe:2.3:a:symfony:symfony:*:*:*:*:*:*:*:* |
symfony | security-bundle | * | cpe:2.3:a:symfony:security-bundle:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-3gv2-29qc-v67m
github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-bundle/CVE-2022-24895.yaml
github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2022-24895.yaml
github.com/symfony/security-bundle/commit/076fd2088ada33d760758d98ff07ddedbf567946
github.com/symfony/symfony/commit/5909d74ecee359ea4982fcf4331aaf2e489a1fd4
github.com/symfony/symfony/security/advisories/GHSA-3gv2-29qc-v67m
lists.debian.org/debian-lts-announce/2023/07/msg00014.html
nvd.nist.gov/vuln/detail/CVE-2022-24895
symfony.com/cve-2022-24895