Количество 244
Количество 244
GHSA-79gr-58r3-pwm3
Symfony Unsafe Cache Serialization Could Enable RCE
GHSA-72x2-5c85-6wmr
Symfony potential Cross-site Scripting in WebhookController
GHSA-66p6-7p29-55p9
Symfony Host Header Injection
GHSA-5pv8-ppvj-4h68
Prevent user enumeration using Guard or the new Authenticator-based Security
GHSA-5c58-w9xc-qcj9
Symfony Vulnerable to PHP Eval Injection
GHSA-4vpc-5jx4-cfqg
User enumeration leak using switch user functionality in Symfony
GHSA-3gv2-29qc-v67m
Symfony vulnerable to Session Fixation of CSRF tokens
GHSA-35c5-28pg-2qg4
Symfony Authentication Bypass
GHSA-2xhg-w2g5-w95x
CSV Injection in symfony/serializer
GHSA-2r5h-6r7v-5m7c
Symphony Vulnerable to PHP Code Injection via YAML Parsing
GHSA-22pv-7v9j-hqxp
Symfony Host Header Injection vulnerability in the HttpFoundation component

CVE-2023-46735
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in version 6.0.0 and prior to version 6.3.8, the error message in `WebhookController` returns unescaped user-submitted input. As of version 6.3.8, `WebhookController` now doesn't return any user-submitted input in its response.

CVE-2023-46735
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in version 6.0.0 and prior to version 6.3.8, the error message in `WebhookController` returns unescaped user-submitted input. As of version 6.3.8, `WebhookController` now doesn't return any user-submitted input in its response.
CVE-2023-46735
Symfony is a PHP framework for web and console applications and a set ...

CVE-2023-46733
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 5.4.21 and 6.2.7 and prior to versions 5.4.31 and 6.3.8, `SessionStrategyListener` does not migrate the session after every successful login. It does so only in case the logged in user changes by means of checking the user identifier. In some use cases, the user identifier doesn't change between the verification phase and the successful login, while the token itself changes from one type (partially-authenticated) to another (fully-authenticated). When this happens, the session id should be regenerated to prevent possible session fixations, which is not the case at the moment. As of versions 5.4.31 and 6.3.8, Symfony now checks the type of the token in addition to the user identifier before deciding whether the session id should be regenerated.

CVE-2023-46733
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 5.4.21 and 6.2.7 and prior to versions 5.4.31 and 6.3.8, `SessionStrategyListener` does not migrate the session after every successful login. It does so only in case the logged in user changes by means of checking the user identifier. In some use cases, the user identifier doesn't change between the verification phase and the successful login, while the token itself changes from one type (partially-authenticated) to another (fully-authenticated). When this happens, the session id should be regenerated to prevent possible session fixations, which is not the case at the moment. As of versions 5.4.31 and 6.3.8, Symfony now checks the type of the token in addition to the user identifier before deciding whether the session id should be regenerated.
CVE-2023-46733
Symfony is a PHP framework for web and console applications and a set ...

CVE-2022-24895
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. This issue has been fixed in the 4.4 branch.

CVE-2022-24895
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. This issue has been fixed in the 4.4 branch.
CVE-2022-24895
Symfony is a PHP framework for web and console applications and a set ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-79gr-58r3-pwm3 Symfony Unsafe Cache Serialization Could Enable RCE | CVSS3: 9.8 | 3% Низкий | больше 5 лет назад | |
GHSA-72x2-5c85-6wmr Symfony potential Cross-site Scripting in WebhookController | CVSS3: 6.1 | 2% Низкий | больше 1 года назад | |
GHSA-66p6-7p29-55p9 Symfony Host Header Injection | CVSS3: 7.2 | 0% Низкий | около 3 лет назад | |
GHSA-5pv8-ppvj-4h68 Prevent user enumeration using Guard or the new Authenticator-based Security | CVSS3: 5.3 | 0% Низкий | около 4 лет назад | |
GHSA-5c58-w9xc-qcj9 Symfony Vulnerable to PHP Eval Injection | 1% Низкий | около 3 лет назад | ||
GHSA-4vpc-5jx4-cfqg User enumeration leak using switch user functionality in Symfony | CVSS3: 5.3 | 2% Низкий | больше 5 лет назад | |
GHSA-3gv2-29qc-v67m Symfony vulnerable to Session Fixation of CSRF tokens | CVSS3: 6.3 | 0% Низкий | больше 2 лет назад | |
GHSA-35c5-28pg-2qg4 Symfony Authentication Bypass | CVSS3: 9.8 | 0% Низкий | около 3 лет назад | |
GHSA-2xhg-w2g5-w95x CSV Injection in symfony/serializer | CVSS3: 6.5 | 1% Низкий | больше 3 лет назад | |
GHSA-2r5h-6r7v-5m7c Symphony Vulnerable to PHP Code Injection via YAML Parsing | 1% Низкий | около 3 лет назад | ||
GHSA-22pv-7v9j-hqxp Symfony Host Header Injection vulnerability in the HttpFoundation component | CVSS3: 6.1 | 1% Низкий | около 3 лет назад | |
![]() | CVE-2023-46735 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in version 6.0.0 and prior to version 6.3.8, the error message in `WebhookController` returns unescaped user-submitted input. As of version 6.3.8, `WebhookController` now doesn't return any user-submitted input in its response. | CVSS3: 6.1 | 2% Низкий | больше 1 года назад |
![]() | CVE-2023-46735 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in version 6.0.0 and prior to version 6.3.8, the error message in `WebhookController` returns unescaped user-submitted input. As of version 6.3.8, `WebhookController` now doesn't return any user-submitted input in its response. | CVSS3: 6.1 | 2% Низкий | больше 1 года назад |
CVE-2023-46735 Symfony is a PHP framework for web and console applications and a set ... | CVSS3: 6.1 | 2% Низкий | больше 1 года назад | |
![]() | CVE-2023-46733 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 5.4.21 and 6.2.7 and prior to versions 5.4.31 and 6.3.8, `SessionStrategyListener` does not migrate the session after every successful login. It does so only in case the logged in user changes by means of checking the user identifier. In some use cases, the user identifier doesn't change between the verification phase and the successful login, while the token itself changes from one type (partially-authenticated) to another (fully-authenticated). When this happens, the session id should be regenerated to prevent possible session fixations, which is not the case at the moment. As of versions 5.4.31 and 6.3.8, Symfony now checks the type of the token in addition to the user identifier before deciding whether the session id should be regenerated. | CVSS3: 6.5 | 1% Низкий | больше 1 года назад |
![]() | CVE-2023-46733 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 5.4.21 and 6.2.7 and prior to versions 5.4.31 and 6.3.8, `SessionStrategyListener` does not migrate the session after every successful login. It does so only in case the logged in user changes by means of checking the user identifier. In some use cases, the user identifier doesn't change between the verification phase and the successful login, while the token itself changes from one type (partially-authenticated) to another (fully-authenticated). When this happens, the session id should be regenerated to prevent possible session fixations, which is not the case at the moment. As of versions 5.4.31 and 6.3.8, Symfony now checks the type of the token in addition to the user identifier before deciding whether the session id should be regenerated. | CVSS3: 6.5 | 1% Низкий | больше 1 года назад |
CVE-2023-46733 Symfony is a PHP framework for web and console applications and a set ... | CVSS3: 6.5 | 1% Низкий | больше 1 года назад | |
![]() | CVE-2022-24895 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. This issue has been fixed in the 4.4 branch. | CVSS3: 6.3 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-24895 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. This issue has been fixed in the 4.4 branch. | CVSS3: 6.3 | 0% Низкий | больше 2 лет назад |
CVE-2022-24895 Symfony is a PHP framework for web and console applications and a set ... | CVSS3: 6.3 | 0% Низкий | больше 2 лет назад |
Уязвимостей на страницу