An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. DefaultAuthenticationSuccessHandler or DefaultAuthenticationFailureHandler takes the content of the _target_path parameter and generates a redirect response, but no check is performed on the path, which could be an absolute URL to an external domain. This Open redirect vulnerability can be exploited for example to mount effective phishing attacks.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1707-1 symfony security update
EUVD EUVD EUVD-2022-5125 An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. DefaultAuthenticationSuccessHandler or DefaultAuthenticationFailureHandler takes the content of the _target_path parameter and generates a redirect response, but no check is performed on the path, which could be an absolute URL to an external domain. This Open redirect vulnerability can be exploited for example to mount effective phishing attacks.
Github GHSA Github GHSA GHSA-r7p7-qr7p-2rrf Symfony Open Redirect
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T20:27:04.285Z

Reserved: 2017-11-07T00:00:00

Link: CVE-2017-16652

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-13T16:29:00.267

Modified: 2024-11-21T03:16:46.070

Link: CVE-2017-16652

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.