CVE-2018-19790
Published: 18 December 2018
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.
Priority
Status
Package | Release | Status |
---|---|---|
symfony Launchpad, Ubuntu, Debian |
bionic |
Needed
|
cosmic |
Ignored
(end of life)
|
|
disco |
Not vulnerable
(3.4.20+dfsg-1)
|
|
eoan |
Not vulnerable
(3.4.20+dfsg-1)
|
|
focal |
Not vulnerable
(3.4.20+dfsg-1)
|
|
groovy |
Not vulnerable
(3.4.20+dfsg-1)
|
|
hirsute |
Not vulnerable
(3.4.20+dfsg-1)
|
|
impish |
Not vulnerable
(3.4.20+dfsg-1)
|
|
jammy |
Not vulnerable
(3.4.20+dfsg-1)
|
|
kinetic |
Not vulnerable
(3.4.20+dfsg-1)
|
|
lunar |
Not vulnerable
(3.4.20+dfsg-1)
|
|
mantic |
Not vulnerable
(3.4.20+dfsg-1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(3.4.20+dfsg-1)
|
|
xenial |
Needed
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |