Vulnerability Name: | CVE-2018-11385 (CCN-144822) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2018-05-25 | ||||||||||||||||||||||||||||||||||||
Published: | 2018-05-25 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-03-12 | ||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in the Security component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. A session fixation vulnerability within the "Guard" login feature may allow an attacker to impersonate a victim towards the web application if the session id value was previously known to the attacker. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-384 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-11385 Source: XF Type: UNKNOWN symfony-cve201811385-session-hijacking(144822) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20190310 [SECURITY] [DLA 1707-1] symfony security update Source: FEDORA Type: Third Party Advisory FEDORA-2018-eba0006df2 Source: FEDORA Type: Third Party Advisory FEDORA-2018-96d770ddc9 Source: FEDORA Type: Third Party Advisory FEDORA-2018-ba0b683c10 Source: CCN Type: Symfony blog, May 25, 2018 CVE-2018-11385: Session Fixation Issue for Guard Authentication Source: CONFIRM Type: Vendor Advisory https://symfony.com/blog/cve-2018-11385-session-fixation-issue-for-guard-authentication Source: DEBIAN Type: Third Party Advisory DSA-4262 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |