Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-51996

Опубликовано: 13 нояб. 2024
Источник: debian
EPSS Низкий

Описание

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. When consuming a persisted remember-me cookie, Symfony does not check if the username persisted in the database matches the username attached with the cookie, leading to authentication bypass. This vulnerability is fixed in 5.4.47, 6.4.15, and 7.1.8.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
symfonyfixed6.4.15+dfsg-1package
symfonynot-affectedbullseyepackage

Примечания

  • https://github.com/symfony/symfony/security/advisories/GHSA-cg23-qf8f-62rr

  • https://github.com/symfony/symfony/commit/81354d392c5f0b7a52bcbd729d6f82501e94135a (v5.4.47, v6.4.15, v7.1.8, v7.2.0-RC1)

EPSS

Процентиль: 20%
0.00062
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
10 месяцев назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. When consuming a persisted remember-me cookie, Symfony does not check if the username persisted in the database matches the username attached with the cookie, leading to authentication bypass. This vulnerability is fixed in 5.4.47, 6.4.15, and 7.1.8.

CVSS3: 7.5
nvd
10 месяцев назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. When consuming a persisted remember-me cookie, Symfony does not check if the username persisted in the database matches the username attached with the cookie, leading to authentication bypass. This vulnerability is fixed in 5.4.47, 6.4.15, and 7.1.8.

CVSS3: 7.5
github
10 месяцев назад

Symfony has an Authentication Bypass via RememberMe

CVSS3: 7.5
fstec
11 месяцев назад

Уязвимость компонента Process программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю обойти ограничения безопасности

EPSS

Процентиль: 20%
0.00062
Низкий