CVE-2018-19790
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.
Se ha descubierto una redirección abierta en Symfony en versiones 2.7.x anteriores a la 2.7.50, versiones 2.8.x anteriores a la 2.8.49, versiones 3.x anteriores a la 3.4.20, versiones 4.0.x anteriores a la 4.0.15, versiones 4.1.x anteriores a la 4.1.9 y versiones 4.2.x anteriores a la 4.2.1. Mediante el uso de barras invertidas en el campo de entrada "_failure_path" de los formularios de inicio de sesión, un atacante puede sortear las restricciones de destino de redirección y redirigir de forma efectiva al usuario a cualquier dominio una vez ha iniciado sesión.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-02 CVE Reserved
- 2018-12-18 CVE Published
- 2024-07-13 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/106249 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html | Mailing List | |
https://seclists.org/bugtraq/2019/May/21 | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://symfony.com/blog/cve-2018-19790-open-redirect-vulnerability-when-using-security- | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 2.7.0 < 2.7.50 Search vendor "Sensiolabs" for product "Symfony" and version " >= 2.7.0 < 2.7.50" | - |
Affected
| ||||||
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 2.8.0 < 2.8.49 Search vendor "Sensiolabs" for product "Symfony" and version " >= 2.8.0 < 2.8.49" | - |
Affected
| ||||||
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 3.0.0 < 3.4.20 Search vendor "Sensiolabs" for product "Symfony" and version " >= 3.0.0 < 3.4.20" | - |
Affected
| ||||||
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 4.0.0 < 4.0.15 Search vendor "Sensiolabs" for product "Symfony" and version " >= 4.0.0 < 4.0.15" | - |
Affected
| ||||||
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 4.1.0 < 4.1.9 Search vendor "Sensiolabs" for product "Symfony" and version " >= 4.1.0 < 4.1.9" | - |
Affected
| ||||||
Sensiolabs Search vendor "Sensiolabs" | Symfony Search vendor "Sensiolabs" for product "Symfony" | >= 4.2.0 < 4.2.1 Search vendor "Sensiolabs" for product "Symfony" and version " >= 4.2.0 < 4.2.1" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 28 Search vendor "Fedoraproject" for product "Fedora" and version "28" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|