English | Deutsch | Español | Português
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
    Search 150599 CVE descriptions
and 73533 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Web application abuses
Title:Sensiolabs Symfony 2.7.x < 2.7.48, 2.8.x < 2.8.41, 3.3.x < 3.3.17, 3.4.x < 3.4.11, and 4.0.x < 4.0.11 Multiple Vulnerabilities
Summary:This host runs Symfony and is prone to multiple vulnerabilities.
This host runs Symfony and is prone to multiple vulnerabilities.

Vulnerability Insight:
The following vulnerabilities exist:

- A session fixation vulnerability within the 'Guard' login feature may allow an attacker to impersonate
a victim towards the web application if the session id value was previously known to the attacker. (CVE-2018-11385)

- The PDOSessionHandler class allows storing sessions on a PDO connection. Under some configurations
and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources.

- By default, a user's session is invalidated when the user is logged out. This behavior can be disabled
through the invalidate_session option. In this case, CSRF tokens were not erased during logout which allowed for CSRF token fixation.

- The security handlers in the Security component in Symfony have an Open redirect vulnerability
when security.http_utils is inlined by a container. NOTE: this issue exists because of an incomplete fix for CVE-2017-16652.

Affected Software/OS:
Symfony versions 2.7.0 to 2.7.47, 2.8.0 to 2.8.40, 3.3.0 to 3.3.16, 3.4.0 to 3.4.10 and 4.0.0 to 4.0.10

The issue has been fixed in Symfony 2.7.48, 2.8.41, 3.3.17, 3.4.11 and 4.0.11.

NOTE: No fixes are provided for Symfony 3.0, 3.1, and 3.2 as they are not maintained anymore.
It is recommended to upgrade to a supported version.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-11385
Common Vulnerability Exposure (CVE) ID: CVE-2018-11386
Common Vulnerability Exposure (CVE) ID: CVE-2018-11406
Common Vulnerability Exposure (CVE) ID: CVE-2018-11408
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
Registered User Login

 Forgot userid or passwd?

Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.