An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106249 - Third Party Advisory, VDB Entry | |
References | () https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TD3E7FZIXLVFG3SMFJPDEKPZ26TJOW7/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZMRJ7VTHCY5AZK24G4QGX36RLUDTDKE/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OA4WVFN5FYPIXAPLWZI6N425JHHDSWAZ/ - | |
References | () https://seclists.org/bugtraq/2019/May/21 - | |
References | () https://symfony.com/blog/cve-2018-19790-open-redirect-vulnerability-when-using-security-http - Patch, Vendor Advisory | |
References | () https://www.debian.org/security/2019/dsa-4441 - |
07 Nov 2023, 02:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-12-18 22:29
Updated : 2024-11-21 03:58
NVD link : CVE-2018-19790
Mitre link : CVE-2018-19790
CVE.ORG link : CVE-2018-19790
JSON object : View
Products Affected
debian
- debian_linux
sensiolabs
- symfony
fedoraproject
- fedora
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')