Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. symfony/security-http
  4. ›
  5. CVE-2017-16652

CVE-2017-16652: Open redirect vulnerability

June 13, 2018 (updated March 13, 2019)

DefaultAuthenticationSuccessHandler or DefaultAuthenticationFailureHandler take the content of the _target_path parameter and generate a redirect response but no check is performed on the path, which could be an absolute URL to an external domain, opening redirect vulnerability. Open redirect vulnerability are not too much considered but they can be exploited for example to mount effective phishing attacks.

References

  • cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16652
  • symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers
  • github.com/symfony/symfony/pull/24995

Code Behaviors & Features

Detect and mitigate CVE-2017-16652 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from v2.7.0-alpha0 up to v2.7.37, all versions starting from v2.8.0-alpha0 up to v2.8.30, all versions starting from v3.2.0-alpha0 up to v3.2.13, all versions starting from v3.3.0-alpha0 up to v3.3.12

Fixed versions

  • v2.7.38
  • v2.8.31
  • v3.2.14
  • v3.3.13
  • v3.4-BETA5
  • v4.0-BETA5

Solution

Upgrade to versions v2.7.38, v2.8.31, v3.2.14, v3.3.13, v3.4-BETA5, v4.0-BETA5 or above.

Impact 6.1 MEDIUM

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

packagist/symfony/security-http/CVE-2017-16652.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:14 +0000.