Search for packages
Package details: pkg:composer/symfony/security-http@3.3.10
purl pkg:composer/symfony/security-http@3.3.10
Next non-vulnerable version 7.1.8
Latest non-vulnerable version 7.2.0-BETA1
Risk 4.0
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-1jny-ned3-cbgs
Aliases:
CVE-2018-11385
GHSA-g4rg-rw65-8hfg
Symfony Session Fixation Vulnerability An issue was discovered in the Security component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. A session fixation vulnerability within the "Guard" login feature may allow an attacker to impersonate a victim towards the web application if the session id value was previously known to the attacker.
3.3.17
Affected by 7 other vulnerabilities.
3.4.11
Affected by 5 other vulnerabilities.
4.0.11
Affected by 5 other vulnerabilities.
VCID-52b6-bavg-suf2
Aliases:
CVE-2018-19790
GHSA-89r2-5g34-2g47
Symfony Open Redirect An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.
3.4.20
Affected by 4 other vulnerabilities.
4.0.15
Affected by 4 other vulnerabilities.
4.1.9
Affected by 5 other vulnerabilities.
4.2.1
Affected by 5 other vulnerabilities.
VCID-7gzy-b9hc-zuh2
Aliases:
CVE-2021-21424
GHSA-5pv8-ppvj-4h68
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The ability to enumerate users was possible without relevant permissions due to different handling depending on whether the user existed or not when attempting to use the switch users functionality. We now ensure that 403s are returned whether the user exists or not if a user cannot switch to a user or if the user does not exist. The patch for this issue is available for branch 3.4.
4.0.0-BETA1
Affected by 2 other vulnerabilities.
4.4.24
Affected by 2 other vulnerabilities.
5.0.0-BETA1
Affected by 1 other vulnerability.
5.2.8
Affected by 3 other vulnerabilities.
VCID-9kvc-6wbe-1fdf
Aliases:
CVE-2018-11406
GHSA-g4g7-q726-v5hg
Symfony CSRF Token Fixation An issue was discovered in the Security component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. By default, a user's session is invalidated when the user is logged out. This behavior can be disabled through the invalidate_session option. In this case, CSRF tokens were not erased during logout which allowed for CSRF token fixation.
3.3.17
Affected by 7 other vulnerabilities.
3.4.11
Affected by 5 other vulnerabilities.
4.0.11
Affected by 5 other vulnerabilities.
VCID-9x61-7xns-b7h1
Aliases:
CVE-2019-10911
GHSA-cchx-mfrc-fwqr
Improper authentication in Symfony In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security.
3.4.26
Affected by 3 other vulnerabilities.
4.1.12
Affected by 5 other vulnerabilities.
4.2.7
Affected by 4 other vulnerabilities.
VCID-hm1q-8mjy-47ek
Aliases:
CVE-2024-36611
GHSA-7q22-x757-cmgc
Withdrawn Advisory: Symfony http-security has authentication bypass ## Withdrawn Advisory This advisory has been withdrawn because the report is not part of a valid vulnerability. This link is maintained to preserve external references. For more information, see advisory-database/pull/5046. ## Original Description In Symfony, a security vulnerability was identified in the FormLoginAuthenticator component, where it failed to adequately handle cases where the username or password field of a login request is empty. This flaw could lead to various security risks, including improper authentication logic handling or denial of service.
7.1.0
Affected by 1 other vulnerability.
VCID-ktnk-qrwf-t3dt
Aliases:
CVE-2017-16652
GHSA-r7p7-qr7p-2rrf
Symfony Open Redirect An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. `DefaultAuthenticationSuccessHandler` or `DefaultAuthenticationFailureHandler` takes the content of the `_target_path` parameter and generates a redirect response, but no check is performed on the path, which could be an absolute URL to an external domain. This Open redirect vulnerability can be exploited for example to mount effective phishing attacks.
3.3.13
Affected by 7 other vulnerabilities.
3.4.0-BETA5
Affected by 0 other vulnerabilities.
4.0.0-BETA5
Affected by 0 other vulnerabilities.
VCID-xv9e-a7qq-63a1
Aliases:
CVE-2023-46734
GHSA-q847-2q57-wmr3
Symfony potential Cross-site Scripting vulnerabilities in CodeExtension filters ### Description Some Twig filters in CodeExtension use "is_safe=html" but don't actually ensure their input is safe. ### Resolution Symfony now escapes the output of the affected filters. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/9da9a145ce57e4585031ad4bee37c497353eec7c) for branch 4.4. ### Credits We would like to thank Pierre Rudloff for reporting the issue and to Nicolas Grekas for providing the fix.
5.0.0-BETA1
Affected by 1 other vulnerability.
5.4.31
Affected by 2 other vulnerabilities.
6.3.8
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-03T19:16:31.576502+00:00 GitLab Importer Affected by VCID-hm1q-8mjy-47ek https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/symfony/security-http/CVE-2024-36611.yml 37.0.0
2025-07-03T18:53:05.088361+00:00 GitLab Importer Affected by VCID-xv9e-a7qq-63a1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/symfony/security-http/CVE-2023-46734.yml 37.0.0
2025-07-03T17:59:31.965945+00:00 GitLab Importer Affected by VCID-7gzy-b9hc-zuh2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/symfony/security-http/CVE-2021-21424.yml 37.0.0
2025-07-03T17:34:07.545830+00:00 GitLab Importer Affected by VCID-9x61-7xns-b7h1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/symfony/security-http/CVE-2019-10911.yml 37.0.0
2025-07-03T17:30:53.366138+00:00 GitLab Importer Affected by VCID-52b6-bavg-suf2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/symfony/security-http/CVE-2018-19790.yml 37.0.0
2025-07-03T17:27:12.451971+00:00 GitLab Importer Affected by VCID-1jny-ned3-cbgs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/symfony/security-http/CVE-2018-11385.yml 37.0.0
2025-07-03T17:27:10.845734+00:00 GitLab Importer Affected by VCID-9kvc-6wbe-1fdf https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/symfony/security-http/CVE-2018-11406.yml 37.0.0
2025-07-03T17:27:09.243236+00:00 GitLab Importer Affected by VCID-ktnk-qrwf-t3dt https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/symfony/security-http/CVE-2017-16652.yml 37.0.0