An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. DefaultAuthenticationSuccessHandler or DefaultAuthenticationFailureHandler takes the content of the _target_path parameter and generates a redirect response, but no check is performed on the path, which could be an absolute URL to an external domain. This Open redirect vulnerability can be exploited for example to mount effective phishing attacks.
References
Link | Resource |
---|---|
https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html | Third Party Advisory |
Information
Published : 2018-06-13 09:29
Updated : 2019-03-13 08:23
NVD link : CVE-2017-16652
Mitre link : CVE-2017-16652
JSON object : View
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
Products Affected
debian
- debian_linux
sensiolabs
- symfony