-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability stems from improper validation of redirect targets in the createRedirectResponse method. The original regex pattern (#^https?://[^/]++#i) only checked for forward slashes after the protocol. By using backslashes (e.g., http:\/\/evil.com), attackers could bypass the domain regex check. The patch modifies the regex to #^https?:[/\\]{2,}+[^/]++#i to detect both forward and backward slashes, confirming this function as the vulnerable entry point. The associated test cases added in HttpUtilsTest.php validate() this behavior change.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| symfony/security-http | composer | >= 2.7.38, < 2.7.50 | 2.7.50 |
| symfony/security-http | composer | >= 2.8.0, < 2.8.49 | 2.8.49 |
| symfony/security-http | composer | >= 3.0.0, < 3.4.20 | 3.4.20 |
| symfony/security-http | composer | >= 4.0.0, < 4.0.15 | 4.0.15 |
| symfony/security-http | composer | >= 4.1.0, < 4.1.9 | 4.1.9 |
| symfony/security-http | composer | >= 4.2.0, < 4.2.1 | 4.2.1 |
| symfony/security | composer | >= 2.7.38, < 2.7.50 | 2.7.50 |
| symfony/security | composer | >= 2.8.0, < 2.8.49 | 2.8.49 |
| symfony/security | composer | >= 3.0.0, < 3.4.19 | 3.4.19 |
| symfony/security | composer | >= 4.0.0, < 4.0.15 | 4.0.15 |
| symfony/security | composer | >= 4.1.0, < 4.1.9 | 4.1.9 |
| symfony/security | composer | >= 4.2.0, < 4.2.1 | 4.2.1 |
| symfony/symfony | composer | >= 2.7.38, < 2.7.50 | 2.7.50 |
| symfony/symfony | composer | >= 2.8.0, < 2.8.49 | 2.8.49 |
| symfony/symfony | composer | >= 3.0.0, < 3.4.20 | 3.4.20 |
| symfony/symfony | composer | >= 4.0.0, < 4.0.15 | 4.0.15 |
| symfony/symfony | composer | >= 4.1.0, < 4.1.9 | 4.1.9 |