6.1

CVE-2018-19790

An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login.

Data is provided by the National Vulnerability Database (NVD)
SensiolabsSymfony Version >= 2.7.0 < 2.7.50
SensiolabsSymfony Version >= 2.8.0 < 2.8.49
SensiolabsSymfony Version >= 3.0.0 < 3.4.20
SensiolabsSymfony Version >= 4.0.0 < 4.0.15
SensiolabsSymfony Version >= 4.1.0 < 4.1.9
SensiolabsSymfony Version >= 4.2.0 < 4.2.1
FedoraprojectFedora Version28
DebianDebian Linux Version8.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.47% 0.636
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.1 2.8 2.7
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:P/I:P/A:N
CWE-601 URL Redirection to Untrusted Site ('Open Redirect')

The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.