Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:4779
HistoryJul 28, 2017 - 7:50 a.m.

Unauthorised Access Through Bypassing URL Signing And Security Rules

2017-07-2807:50:50
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
9

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

Symfony is susceptible to unauthorized access. A malicious user can bypass URL signing and security rules by passing an empty or invalid hash to the _fragment path to gain access to any controller since the application does not properly check if the _controller attribute was set. This only affects applications which have ESI or SSI support enabled.

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N