fkie_cve-2012-2667
Vulnerability from fkie_nvd
Published
2012-06-07 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Session fixation vulnerability in lib/user/sfBasicSecurityUser.class.php in SensioLabs Symfony before 1.4.18 allows remote attackers to hijack web sessions via vectors related to the regenerate method and unspecified "database backed session classes."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sensiolabs | symfony | * | |
sensiolabs | symfony | 1.4.0 | |
sensiolabs | symfony | 1.4.0 | |
sensiolabs | symfony | 1.4.0 | |
sensiolabs | symfony | 1.4.1 | |
sensiolabs | symfony | 1.4.2 | |
sensiolabs | symfony | 1.4.3 | |
sensiolabs | symfony | 1.4.4 | |
sensiolabs | symfony | 1.4.5 | |
sensiolabs | symfony | 1.4.6 | |
sensiolabs | symfony | 1.4.7 | |
sensiolabs | symfony | 1.4.8 | |
sensiolabs | symfony | 1.4.9 | |
sensiolabs | symfony | 1.4.10 | |
sensiolabs | symfony | 1.4.11 | |
sensiolabs | symfony | 1.4.12 | |
sensiolabs | symfony | 1.4.13 | |
sensiolabs | symfony | 1.4.14 | |
sensiolabs | symfony | 1.4.15 | |
sensiolabs | symfony | 1.4.16 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F2CC4DC-C123-4285-BFD2-3AA0ED61F575", "versionEndIncluding": "1.4.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4F1040D-AFBA-4A73-AC13-8504A0625AEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "84094B27-A701-4978-91D7-587AF314B6AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79B1B57C-DE96-4ECB-AD92-F52667FC4E18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "78201955-7DCB-4FA2-B745-67DDE420BB2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F4680367-B5EA-4593-8F72-0E4C1EAA30AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "DF0B4301-FF9E-4C02-8E0F-42C25831EC99", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A4C4F47-4DEB-45A0-BD05-245079D1A914", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "3356E269-D119-4130-92A5-A8DBA0FAB738", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E0F0D5B3-00CE-4A86-9063-14B150CB973A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "4FBC37A5-5ABA-4A1B-9CF8-E10D74B603C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "7AC08043-3427-4F2F-BE15-9800AD5DE6B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "2E73B1AE-6AAE-4862-89D5-E58F3FEF474F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "82BF2472-CD81-4578-8FE4-52BEF395FD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "2143A607-79CE-4D2D-BE8E-3F3F164733B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "C1A59CD0-89BC-461C-B7D7-74CB94C2EF15", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "3197A9BD-E102-4397-932F-BB3ED97937AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "3FEB7732-879C-4C82-82F4-89C4D37A53C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "729995D3-4D28-4ECF-9A2B-61EF87F8A766", "vulnerable": true }, { "criteria": "cpe:2.3:a:sensiolabs:symfony:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "1BCCFEAB-1CBE-4EF6-9DB0-D614D349A6E3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Session fixation vulnerability in lib/user/sfBasicSecurityUser.class.php in SensioLabs Symfony before 1.4.18 allows remote attackers to hijack web sessions via vectors related to the regenerate method and unspecified \"database backed session classes.\"" }, { "lang": "es", "value": "Vulnerabilidad de fijaci\u00f3n de sesi\u00f3n en lib/user/sfBasicSecurityUser.class.php en SensioLabs Symfony antes de v1.4.18 permite a atacantes remotos secuestrar sesiones web a trav\u00e9s de vectores relacionados con el m\u00e9todo \u0027regenerate\u0027 y \"clases de sesi\u00f3n de respaldo de base de datos\" no especificadas." } ], "id": "CVE-2012-2667", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-06-07T19:55:09.353", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49312" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://symfony.com/blog/security-release-symfony-1-4-18-released" }, { "source": "secalert@redhat.com", "url": "http://trac.symfony-project.org/browser/tags/RELEASE_1_4_18/CHANGELOG" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/06/04/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/06/05/2" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/53776" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://symfony.com/blog/security-release-symfony-1-4-18-released" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://trac.symfony-project.org/browser/tags/RELEASE_1_4_18/CHANGELOG" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/06/04/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/06/05/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76027" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…