8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
50.6%
When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation.
Symfony removes all CSRF tokens from the session on successful login.
The patch for this issue is available here for branch 4.4.
We would like to thank Marco Squarcina for reporting the issue and Nicolas Grekas for fixing it.
github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-bundle/CVE-2022-24895.yaml
github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2022-24895.yaml
github.com/symfony/security-bundle/commit/076fd2088ada33d760758d98ff07ddedbf567946
github.com/symfony/symfony
github.com/symfony/symfony/commit/5909d74ecee359ea4982fcf4331aaf2e489a1fd4
github.com/symfony/symfony/security/advisories/GHSA-3gv2-29qc-v67m
lists.debian.org/debian-lts-announce/2023/07/msg00014.html
nvd.nist.gov/vuln/detail/CVE-2022-24895
symfony.com/cve-2022-24895