
Cloud Vulnerability DB
A community-led vulnerabilities database
Symfony, a PHP framework for web and console applications, was affected by a vulnerability (CVE-2021-32693) in versions 5.3.0 through 5.3.2 of the Security HTTP component. The vulnerability was discovered and disclosed on June 17, 2021, impacting the firewall authentication mechanism of the framework (Symfony Blog, GitHub Advisory).
The vulnerability occurred when an application defined multiple firewalls, where an authenticated token delivered by one firewall became available to all other firewalls. This security flaw manifested in the ContextListener component, which incorrectly handled the authentication token across different firewall contexts. The issue was fixed by ensuring that authenticated tokens are only available for the specific firewall that generates them (GitHub Commit).
When an application defined different providers for different parts of the application, this vulnerability could be exploited to bypass authentication boundaries. A user authenticated on one part of the application would be considered authenticated across the entire application, potentially gaining unauthorized access to protected resources (Symfony Blog).
The vulnerability was patched in Symfony version 5.3.2. Users are advised to upgrade to this version or later to resolve the security issue. The fix ensures that authenticated tokens are properly scoped to their respective firewalls (Symfony Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."