Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. symfony/security
  4. ›
  5. CVE-2017-16652

CVE-2017-16652: URL Redirection to Untrusted Site (Open Redirect)

June 13, 2018 (updated March 13, 2019)

DefaultAuthenticationSuccessHandler or DefaultAuthenticationFailureHandler takes the content of the _target_path parameter and generates a redirect response, but no check is performed on the path, which could be an absolute URL to an external domain. This Open redirect vulnerability can be exploited for example to mount effective phishing attacks.

References

  • symfony.com/cve-2017-16652

Code Behaviors & Features

Detect and mitigate CVE-2017-16652 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.7.0 before 2.7.38, all versions starting from 2.8.0 before 2.8.31, all versions starting from 3.0.0 before 3.2.14, all versions starting from 3.3.0 before 3.3.13

Fixed versions

  • 2.7.38
  • 2.8.31
  • 3.2.14
  • 3.3.13

Solution

Upgrade to versions 2.7.38, 2.8.31, 3.2.14, 3.3.13 or above.

Impact 6.1 MEDIUM

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

packagist/symfony/security/CVE-2017-16652.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:08 +0000.