Vulnerabilities affecting this package (0)
Vulnerability |
Summary |
Fixed by |
This package is not known to be affected by vulnerabilities.
|
Vulnerabilities fixed by this package (2)
Vulnerability |
Summary |
Aliases |
VCID-te8y-b96w-1fcj
|
Symfony possible session fixation vulnerability
### Description
SessionStrategyListener does not always migrate the session after a successful login. It only migrate the session when the logged-in user identifier changes. In some use cases, the user identifier doesn't change between the verification phase and the successful login, while the token itself changes from one type (partially-authenticated) to another (fully-authenticated). When this happens, the session id should be regenerated to prevent possible session fixations.
### Resolution
Symfony now checks the type of the token in addition to the user identifier before deciding whether the session id should be regenerated.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/dc356499d5ceb86f7cf2b4c7f032eca97061ed74) for branch 5.4.
### Credits
We would like to thank Robert Meijers for reporting the issue and providing the fix.
|
CVE-2023-46733
GHSA-m2wj-r6g3-fxfx
|
VCID-xv9e-a7qq-63a1
|
Symfony potential Cross-site Scripting vulnerabilities in CodeExtension filters
### Description
Some Twig filters in CodeExtension use "is_safe=html" but don't actually ensure their input is safe.
### Resolution
Symfony now escapes the output of the affected filters.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/9da9a145ce57e4585031ad4bee37c497353eec7c) for branch 4.4.
### Credits
We would like to thank Pierre Rudloff for reporting the issue and to Nicolas Grekas for providing the fix.
|
CVE-2023-46734
GHSA-q847-2q57-wmr3
|