The attemptAuthentication function in Component/Security/Http/Firewall/UsernamePasswordFormAuthenticationListener.php in Symfony before 2.3.41, 2.7.x before 2.7.13, 2.8.x before 2.8.6, and 3.0.x before 3.0.6 does not limit the length of a username stored in a session, which allows remote attackers to cause a denial of service (session storage consumption) via a series of authentication attempts with long, non-existent usernames.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2016/dsa-3588 - | |
References | () https://github.com/symfony/symfony/pull/18733 - | |
References | () https://symfony.com/blog/cve-2016-4423-large-username-storage-in-session - Vendor Advisory |
Information
Published : 2016-06-01 22:59
Updated : 2024-11-21 02:52
NVD link : CVE-2016-4423
Mitre link : CVE-2016-4423
CVE.ORG link : CVE-2016-4423
JSON object : View
Products Affected
debian
- debian_linux
sensiolabs
- symfony
CWE
CWE-399
Resource Management Errors