Miggo Logo

CVE-2013-5958: Symfony Denial of Service Via Long Password Hashing

5

CVSS Score

Basic Information

EPSS Score
0.63804%
Published
5/17/2022
Updated
4/25/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
symfony/symfonycomposer>= 2.0.0, < 2.0.252.0.25
symfony/symfonycomposer>= 2.1.0, < 2.1.132.1.13
symfony/symfonycomposer>= 2.2.0, < 2.2.92.2.9
symfony/symfonycomposer>= 2.3.0, < 2.3.62.3.6
symfony/polyfillcomposer>= 1.0.0, < 1.10.01.10.0
symfony/securitycomposer>= 2.0.0, < 2.0.252.0.25
symfony/securitycomposer>= 2.1.0, < 2.1.132.1.13
symfony/securitycomposer>= 2.2.0, < 2.2.92.2.9
symfony/securitycomposer>= 2.3.0, < 2.3.62.3.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from password handling functions not limiting input size before resource-intensive hashing operations. The Security component's encoder interface and its implementations (like Pbkdf2PasswordEncoder) were directly responsible for processing passwords. Patches added length checks in encodePassword() and isPasswordValid(), confirming these as the vulnerable entry points. The CVE description and Symfony's advisory explicitly mention these methods' role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** S**urity *ompon*nt in Sym*ony *.*.x ***or* *.*.**, *.*.x ***or* *.*.**, *.*.x ***or* *.*.*, *n* *.*.x ***or* *.*.* *llows r*mot* *tt**k*rs to **us* * **ni*l o* s*rvi** (*PU *onsumption) vi* * lon* p*sswor* t**t tri***rs *n *xp*nsiv* **s* *omput*t

Reasoning

T** vuln*r**ility st*mm** *rom p*sswor* **n*lin* *un*tions not limitin* input siz* ***or* r*sour**-int*nsiv* **s*in* op*r*tions. T** S**urity *ompon*nt's *n*o**r int*r**** *n* its impl*m*nt*tions (lik* `P*k***P*sswor**n*o**r`) w*r* *ir**tly r*sponsi*