
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-41268 affects Symfony/SecurityBundle, the security system for Symfony PHP framework. The vulnerability was discovered in version 5.3.0 and fixed in version 5.3.12, released on November 24, 2021. The issue affects the Remember Me cookie functionality, where the cookie is not invalidated when a user changes their password (Symfony Advisory).
The vulnerability stems from a rework of the Remember Me cookie functionality in Symfony 5.3.0. When a user changes their password, the existing Remember Me cookie remains valid instead of being invalidated. This occurs because the password is not included in the cookie's signature, allowing continued access to the account even after password changes (Symfony Advisory).
An attacker who has previously obtained a valid Remember Me cookie can maintain access to the affected account even after the user changes their password. This persistence of access undermines the security measure of password changes, potentially allowing unauthorized access to user accounts (Symfony Advisory).
The issue was fixed in Symfony version 5.3.12 by making the password part of the cookie's signature by default. This ensures that when a password is changed, the Remember Me cookie becomes invalid. Users should upgrade to version 5.3.12 or later to implement this fix (Symfony Advisory, Symfony Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."