Skip to content

CVE-2024-51996: Authentication Bypass via persisted RememberMe cookie

November 13, 2024 Published by Avatar of Fabien Potencier\ \ \ '" class="ui-avatar d-inline-block object-fit-cover ui-avatar-with-border me-2"> Fabien Potencier

Affected versions

Symfony versions>=5.3, <5.4.47;>=6, <6.4.15;>=7, <7.1.8 of the Symfony Security-Http component are affected by this security issue.

The issue has been fixed in Symfony 5.4.47, 6.4.15, and 7.1.8.

Description

When consuming a persisted remember-me cookie, Symfony does not check if the username persisted in the database matches the username attached with the cookie, leading to authentication bypass.

Resolution

The PersistentRememberMeHandler class now ensures the submitted username is the cookie owner.

The patch for this issue is available here for branch 5.4.

Credits

We would like to thank Moritz Rauch - Pentryx AG for reporting the issue and JΓ©rΓ©my DerussΓ© for providing the fix.

Have found a security issue in Symfony? Send the details to security [at] symfony.com and don't disclose it publicly until we can provide a fix for it.

Manage your notification preferences to receive an email as soon as a Symfony security release is published.

Help the Symfony project!

As with any Open-Source project, contributing code or documentation is the most common way to help, but we also have a wide range of sponsoring opportunities.

Comments are closed.

To ensure that comments stay relevant, they are closed for old posts.

AltStyle γ«γ‚ˆγ£γ¦ε€‰ζ›γ•γ‚ŒγŸγƒšγƒΌγ‚Έ (->γ‚ͺγƒͺγ‚ΈγƒŠγƒ«) /