Search for packages
Package details: pkg:composer/symfony/security-http@2.7.38
purl pkg:composer/symfony/security-http@2.7.38
Next non-vulnerable version 2.7.48
Latest non-vulnerable version 7.1.8
Risk
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-52b6-bavg-suf2
Aliases:
CVE-2018-19790
GHSA-89r2-5g34-2g47
Symfony Open Redirect An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.
2.7.50
Affected by 0 other vulnerabilities.
2.8.49
Affected by 0 other vulnerabilities.
3.4.20
Affected by 0 other vulnerabilities.
4.0.15
Affected by 0 other vulnerabilities.
4.1.9
Affected by 0 other vulnerabilities.
4.2.1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-ktnk-qrwf-t3dt Symfony Open Redirect An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. `DefaultAuthenticationSuccessHandler` or `DefaultAuthenticationFailureHandler` takes the content of the `_target_path` parameter and generates a redirect response, but no check is performed on the path, which could be an absolute URL to an external domain. This Open redirect vulnerability can be exploited for example to mount effective phishing attacks. CVE-2017-16652
GHSA-r7p7-qr7p-2rrf