Vulnerabilities > CVE-2018-11408 - Open Redirect vulnerability in multiple products

047910
CVSS 6.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
LOW
Integrity impact
LOW
Availability impact
NONE
network
low complexity
sensiolabs
debian
CWE-601
nessus

Summary

The security handlers in the Security component in Symfony in 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11 have an Open redirect vulnerability when security.http_utils is inlined by a container. NOTE: this issue exists because of an incomplete fix for CVE-2017-16652.

Vulnerable Configurations

Part Description Count
Application
Sensiolabs
147
OS
Debian
1

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Fake the Source of Data
    An adversary provides data under a falsified identity. The purpose of using the falsified identity may be to prevent traceability of the provided data or it might be an attempt by the adversary to assume the rights granted to another identity. One of the simplest forms of this attack would be the creation of an email message with a modified "From" field in order to appear that the message was sent from someone other than the actual sender. Results of the attack vary depending on the details of the attack, but common results include privilege escalation, obfuscation of other attacks, and data corruption/manipulation.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-EBA0006DF2.NASL
    description**Version 2.8.41** (2018-05-25) - bug #27359 [HttpFoundation] Fix perf issue during MimeTypeGuesser intialization (nicolas-grekas) - security #cve-2018-11408 [SecurityBundle] Fail if security.http_utils cannot be configured - security #cve-2018-11406 clear CSRF tokens when the user is logged out - security #cve-2018-11385 Adding session authentication strategy to Guard to avoid session fixation - security #cve-2018-11385 Adding session strategy to ALL listeners to avoid *any* possible fixation - security #cve-2018-11386 [HttpFoundation] Break infinite loop in PdoSessionHandler when MySQL is in loose mode ---- **Version 2.8.40** (2018-05-21) - bug #26781 [Form] Fix precision of MoneyToLocalizedStringTransformer
    last seen2020-06-05
    modified2019-01-03
    plugin id120881
    published2019-01-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120881
    titleFedora 28 : php-symfony (2018-eba0006df2)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory FEDORA-2018-eba0006df2.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(120881);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2018-11385", "CVE-2018-11386", "CVE-2018-11406", "CVE-2018-11408");
      script_xref(name:"FEDORA", value:"2018-eba0006df2");
    
      script_name(english:"Fedora 28 : php-symfony (2018-eba0006df2)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "**Version 2.8.41** (2018-05-25)
    
      - bug #27359 [HttpFoundation] Fix perf issue during
        MimeTypeGuesser intialization (nicolas-grekas)
    
      - security #cve-2018-11408 [SecurityBundle] Fail if
        security.http_utils cannot be configured
    
      - security #cve-2018-11406 clear CSRF tokens when the user
        is logged out
    
      - security #cve-2018-11385 Adding session authentication
        strategy to Guard to avoid session fixation
    
      - security #cve-2018-11385 Adding session strategy to ALL
        listeners to avoid *any* possible fixation
    
      - security #cve-2018-11386 [HttpFoundation] Break infinite
        loop in PdoSessionHandler when MySQL is in loose mode
    
    ----
    
    **Version 2.8.40** (2018-05-21)
    
      - bug #26781 [Form] Fix precision of
        MoneyToLocalizedStringTransformer's divisions on
        transform() (syastrebov)
    
      - bug #27286 [Translation] Add Occitan plural rule
        (kylekatarnls)
    
      - bug #27246 Disallow invalid characters in session.name
        (ostrolucky)
    
      - bug #24805 [Security] Fix logout (MatTheCat)
    
      - bug #27141 [Process] Suppress warnings when open_basedir
        is non-empty (cbj4074)
    
      - bug #27250 [Session] limiting :key for GET_LOCK to 64
        chars (oleg-andreyev)
    
      - bug #27237 [Debug] Fix populating error_get_last() for
        handled silent errors (nicolas-grekas)
    
      - bug #27236 [Filesystem] Fix usages of error_get_last()
        (nicolas-grekas)
    
      - bug #27152 [HttpFoundation] use brace-style regex
        delimiters (xabbuh)
    
      - feature #24896 Add CODE_OF_CONDUCT.md (egircys)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora update system website.
    Tenable has attempted to automatically clean and format it as much as
    possible without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bodhi.fedoraproject.org/updates/FEDORA-2018-eba0006df2"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected php-symfony package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:php-symfony");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:28");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/06/13");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/06/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/01/03");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! preg(pattern:"^28([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 28", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"FC28", reference:"php-symfony-2.8.41-1.fc28")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "php-symfony");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-96D770DDC9.NASL
    description**Version 4.0.11** (2018-05-25) - bug #27364 [DI] Fix bad exception on uninitialized references to non-shared services (nicolas-grekas) - bug #27359 [HttpFoundation] Fix perf issue during MimeTypeGuesser intialization (nicolas-grekas) - security #cve-2018-11408 [SecurityBundle] Fail if security.http_utils cannot be configured - security #cve-2018-11406 clear CSRF tokens when the user is logged out - security #cve-2018-11385 migrating session for UsernamePasswordJsonAuthenticationListener - security #cve-2018-11385 Adding session authentication strategy to Guard to avoid session fixation - security #cve-2018-11385 Adding session strategy to ALL listeners to avoid *any* possible fixation - security #cve-2018-11386 [HttpFoundation] Break infinite loop in PdoSessionHandler when MySQL is in loose mode - bug #27341 [WebProfilerBundle] Fixed validator/dump trace CSS (yceruto) - bug #27337 [FrameworkBundle] fix typo in CacheClearCommand (emilielorenzo) ---- **Version 4.0.10** (2018-05-21) - bug #27264 [Validator] Use strict type in URL validator (mimol91) - bug #27267 [DependencyInjection] resolve array env vars (jamesthomasonjr) - bug #26781 [Form] Fix precision of MoneyToLocalizedStringTransformer
    last seen2020-06-05
    modified2019-01-03
    plugin id120636
    published2019-01-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120636
    titleFedora 28 : php-symfony4 (2018-96d770ddc9)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1707.NASL
    descriptionSeveral security vulnerabilities have been discovered in symfony, a PHP web application framework. Numerous symfony components are affected: Security, bundle readers, session handling, SecurityBundle, HttpFoundation, Form, and Security\Http. The corresponding upstream advisories contain further details : [CVE-2017-16652] https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on -security-handlers [CVE-2017-16654] https://symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-o ut-of-paths [CVE-2018-11385] https://symfony.com/blog/cve-2018-11385-session-fixation-issue-for-gua rd-authentication [CVE-2018-11408] https://symfony.com/blog/cve-2018-11408-open-redirect-vulnerability-on -security-handlers [CVE-2018-14773] https://symfony.com/blog/cve-2018-14773-remove-support-for-legacy-and- risky-http-headers [CVE-2018-19789] https://symfony.com/blog/cve-2018-19789-disclosure-of-uploaded-files-f ull-path [CVE-2018-19790] https://symfony.com/blog/cve-2018-19790-open-redirect-vulnerability-wh en-using-security-http For Debian 8
    last seen2020-06-01
    modified2020-06-02
    plugin id122721
    published2019-03-11
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122721
    titleDebian DLA-1707-1 : symfony security update
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-BA0B683C10.NASL
    description**Version 3.4.11** (2018-05-25) - bug #27364 [DI] Fix bad exception on uninitialized references to non-shared services (nicolas-grekas) - bug #27359 [HttpFoundation] Fix perf issue during MimeTypeGuesser intialization (nicolas-grekas) - security #cve-2018-11408 [SecurityBundle] Fail if security.http_utils cannot be configured - security #cve-2018-11406 clear CSRF tokens when the user is logged out - security #cve-2018-11385 migrating session for UsernamePasswordJsonAuthenticationListener - security #cve-2018-11385 Adding session authentication strategy to Guard to avoid session fixation - security #cve-2018-11385 Adding session strategy to ALL listeners to avoid *any* possible fixation - security #cve-2018-11386 [HttpFoundation] Break infinite loop in PdoSessionHandler when MySQL is in loose mode - bug #27341 [WebProfilerBundle] Fixed validator/dump trace CSS (yceruto) - bug #27337 [FrameworkBundle] fix typo in CacheClearCommand (emilielorenzo) ---- **Version 3.4.10** (2018-05-21) - bug #27264 [Validator] Use strict type in URL validator (mimol91) - bug #27267 [DependencyInjection] resolve array env vars (jamesthomasonjr) - bug #26781 [Form] Fix precision of MoneyToLocalizedStringTransformer
    last seen2020-06-05
    modified2019-01-03
    plugin id120738
    published2019-01-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120738
    titleFedora 28 : php-symfony3 (2018-ba0b683c10)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-C8DDC44BBB.NASL
    description## 3.3.17 (2018-05-25) - security #cve-2018-11407 [Ldap] cast to string when checking empty passwords - security #cve-2018-11408 [SecurityBundle] Fail if security.http_utils cannot be configured - security #cve-2018-11406 clear CSRF tokens when the user is logged out - security #cve-2018-11385 migrating session for UsernamePasswordJsonAuthenticationListener - security #cve-2018-11386 [HttpFoundation] Break infinite loop in PdoSessionHandler when MySQL is in loose mode Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2018-07-09
    plugin id110952
    published2018-07-09
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/110952
    titleFedora 27 : php-symfony3 (2018-c8ddc44bbb)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-2BDFC9DC67.NASL
    description## 2.8.42 (2018-06-25) - bug #27669 [Filesystem] fix file lock on SunOS (fritzmg) - bug #27309 Fix surrogate not using original request (Toflar) - bug #27630 [Validator][Form] Remove BOM in some xlf files (gautierderuette) - bug #27591 [VarDumper] Fix dumping ArrayObject and ArrayIterator instances (nicolas-grekas) - bug #27581 Fix bad method call with guard authentication + session migration (weaverryan) - bug #27452 Avoid migration on stateless firewalls (weaverryan) - bug #27514 [Debug] Pass previous exception to FatalErrorException (pmontoya) - bug #26973 [HttpKernel] Set first trusted proxy as REMOTE_ADDR in InlineFragmentRenderer. (kmadejski) - bug #27303 [Process] Consider
    last seen2020-06-05
    modified2018-07-09
    plugin id110949
    published2018-07-09
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/110949
    titleFedora 27 : php-symfony (2018-2bdfc9dc67)