-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| symfony/security-http | composer | >= 2.3.0, < 2.3.41 | 2.3.41 |
| symfony/security-http | composer | >= 2.4.0, < 2.7.13 | 2.7.13 |
| symfony/security-http | composer | >= 2.8.0, < 2.8.6 | 2.8.6 |
| symfony/security-http | composer | >= 3.0.0, < 3.0.6 | 3.0.6 |
| symfony/security | composer | >= 2.3.0, < 2.3.41 | 2.3.41 |
| symfony/security | composer | >= 2.4.0, < 2.7.13 | 2.7.13 |
| symfony/security | composer | >= 2.8.0, < 2.8.6 | 2.8.6 |
| symfony/security | composer | >= 3.0.0, < 3.0.6 | 3.0.6 |
| symfony/symfony | composer | >= 2.3.0, < 2.3.41 | 2.3.41 |
| symfony/symfony | composer | >= 2.4.0, < 2.7.13 | 2.7.13 |
| symfony/symfony | composer | >= 2.8.0, < 2.8.6 | 2.8.6 |
| symfony/symfony | composer | >= 3.0.0, < 3.0.6 | 3.0.6 |
The vulnerability description explicitly identifies the attemptAuthentication function in UsernamePasswordFormAuthenticationListener.php as the source of the issue. Multiple authoritative sources (Symfony security advisory, CVE description, GitHub advisory) confirm this function's role in storing unchecked username values in sessions. The subsequent patch in Symfony's repository modifies this exact function to add length validation, corroborating its vulnerability status. The clear correlation between the vulnerability description, affected component, and patched code location provides high confidence in this assessment.