CVE-2013-5958: Symfony Denial of Service Via Long Password Hashing
5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.63804%
CWE
Published
5/17/2022
Updated
4/25/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
symfony/symfony | composer | >= 2.0.0, < 2.0.25 | 2.0.25 |
symfony/symfony | composer | >= 2.1.0, < 2.1.13 | 2.1.13 |
symfony/symfony | composer | >= 2.2.0, < 2.2.9 | 2.2.9 |
symfony/symfony | composer | >= 2.3.0, < 2.3.6 | 2.3.6 |
symfony/polyfill | composer | >= 1.0.0, < 1.10.0 | 1.10.0 |
symfony/security | composer | >= 2.0.0, < 2.0.25 | 2.0.25 |
symfony/security | composer | >= 2.1.0, < 2.1.13 | 2.1.13 |
symfony/security | composer | >= 2.2.0, < 2.2.9 | 2.2.9 |
symfony/security | composer | >= 2.3.0, < 2.3.6 | 2.3.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from password handling functions not limiting input size before resource-intensive hashing operations. The Security component's encoder interface and its implementations (like Pbkdf2PasswordEncoder
) were directly responsible for processing passwords. Patches added length checks in encodePassword()
and isPasswordValid()
, confirming these as the vulnerable entry points. The CVE description and Symfony's advisory explicitly mention these methods' role in the vulnerability.