An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. DefaultAuthenticationSuccessHandler or DefaultAuthenticationFailureHandler takes the content of the _target_path parameter and generates a redirect response, but no check is performed on the path, which could be an absolute URL to an external domain. This Open redirect vulnerability can be exploited for example to mount effective phishing attacks.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html | Third Party Advisory |
https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html | Third Party Advisory |
https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html - Third Party Advisory | |
References | () https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers - Vendor Advisory |
Information
Published : 2018-06-13 16:29
Updated : 2024-11-21 03:16
NVD link : CVE-2017-16652
Mitre link : CVE-2017-16652
CVE.ORG link : CVE-2017-16652
JSON object : View
Products Affected
debian
- debian_linux
sensiolabs
- symfony
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')