Symfony — фреймворк c открытым исходным кодом, написанный на PHP.
Релизный цикл, информация об уязвимостях
График релизов
Количество 247
GHSA-22pv-7v9j-hqxp
Symfony Host Header Injection vulnerability in the HttpFoundation component
GHSA-q8j7-fjh7-25v5
Symfony collectionCascaded and collectionCascadedDeeply fields security bypass
GHSA-q8hg-pf8v-cxrv
Symfony Http-Kernel has non-constant time comparison in UriSigner

CVE-2022-23601
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user. When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the configuration is not specified, by default, the mechanism is enabled as long as the session is enabled. In a recent change in the way the configuration is loaded, the default behavior has been dropped and, as a result, the CSRF protection is not enabled in form when not explicitly enabled, which makes the application sensible to CSRF attacks. This issue has been resolved in the patch versions listed and users are advised to update. There are no known workarounds for this issue.
CVE-2022-23601
Symfony is a PHP framework for web and console applications and a set ...

CVE-2022-23601
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user. When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the configuration is not specified, by default, the mechanism is enabled as long as the session is enabled. In a recent change in the way the configuration is loaded, the default behavior has been dropped and, as a result, the CSRF protection is not enabled in form when not explicitly enabled, which makes the application sensible to CSRF attacks. This issue has been resolved in the patch versions listed and users are advised to update. There are no known workarounds for this issue.
GHSA-vvmr-8829-6whx
CSRF token missing in Symfony

BDU:2023-05710
Уязвимость программной платформы для разработки и управления веб-приложениями Symfony , связанная с недостаточной проверкой подлинности выполняемых запросов, позволяющая нарушителю осуществить CSRF-атаку
GHSA-2xhg-w2g5-w95x
CSV Injection in symfony/serializer
GHSA-qw36-p97w-vcqr
Cookie persistence after password changes in symfony/security-bundle
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
GHSA-22pv-7v9j-hqxp Symfony Host Header Injection vulnerability in the HttpFoundation component | CVSS3: 6.1 | 1% Низкий | больше 3 лет назад | |
GHSA-q8j7-fjh7-25v5 Symfony collectionCascaded and collectionCascadedDeeply fields security bypass | CVSS3: 8.1 | 1% Низкий | больше 3 лет назад | |
GHSA-q8hg-pf8v-cxrv Symfony Http-Kernel has non-constant time comparison in UriSigner | CVSS3: 8.1 | 1% Низкий | больше 3 лет назад | |
![]() | CVE-2022-23601 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user. When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the configuration is not specified, by default, the mechanism is enabled as long as the session is enabled. In a recent change in the way the configuration is loaded, the default behavior has been dropped and, as a result, the CSRF protection is not enabled in form when not explicitly enabled, which makes the application sensible to CSRF attacks. This issue has been resolved in the patch versions listed and users are advised to update. There are no known workarounds for this issue. | CVSS3: 8.1 | 0% Низкий | больше 3 лет назад |
CVE-2022-23601 Symfony is a PHP framework for web and console applications and a set ... | CVSS3: 8.1 | 0% Низкий | больше 3 лет назад | |
![]() | CVE-2022-23601 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user. When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the configuration is not specified, by default, the mechanism is enabled as long as the session is enabled. In a recent change in the way the configuration is loaded, the default behavior has been dropped and, as a result, the CSRF protection is not enabled in form when not explicitly enabled, which makes the application sensible to CSRF attacks. This issue has been resolved in the patch versions listed and users are advised to update. There are no known workarounds for this issue. | CVSS3: 8.1 | 0% Низкий | больше 3 лет назад |
GHSA-vvmr-8829-6whx CSRF token missing in Symfony | CVSS3: 8.1 | 0% Низкий | больше 3 лет назад | |
![]() | BDU:2023-05710 Уязвимость программной платформы для разработки и управления веб-приложениями Symfony , связанная с недостаточной проверкой подлинности выполняемых запросов, позволяющая нарушителю осуществить CSRF-атаку | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
GHSA-2xhg-w2g5-w95x CSV Injection in symfony/serializer | CVSS3: 6.5 | 1% Низкий | больше 3 лет назад | |
GHSA-qw36-p97w-vcqr Cookie persistence after password changes in symfony/security-bundle | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу