Miggo Logo

CVE-2022-24894:
Symfony storing cookie headers in HttpCache

5.9

CVSS Score

Basic Information

EPSS Score
-
Published
2/1/2023
Updated
2/13/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
symfony/http-kernelcomposer>= 2.0.0, < 4.4.504.4.50
symfony/http-kernelcomposer>= 5.0.0, < 5.4.205.4.20
symfony/http-kernelcomposer>= 6.0.0, < 6.0.206.0.20
symfony/http-kernelcomposer>= 6.1.0, < 6.1.126.1.12
symfony/http-kernelcomposer>= 6.2.0, < 6.2.66.2.6
symfony/symfonycomposer>= 2.0.0, < 4.4.504.4.50
symfony/symfonycomposer>= 5.0.0, < 5.4.205.4.20
symfony/symfonycomposer>= 6.0.0, < 6.0.206.0.20
symfony/symfonycomposer>= 6.1.0, < 6.1.126.1.12
symfony/symfonycomposer>= 6.2.0, < 6.2.66.2.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the HTTP cache system storing responses with 'Set-Cookie' headers. The patch modifies the Store class constructor to accept private headers and adds logic in the write method to remove them. The pre-patch version of write() lacked this header removal step, making it the vulnerable function. The test case added in StoreTest.php explicitly verifies this behavior, confirming write() as the entry point for improper header storage.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**s*ription ----------- T** Sym*ony *TTP ***** syst*m **ts *s * r*v*rs* proxy: it *****s *TTP r*spons*s (in*lu*in* *****rs) *n* r*turns t**m to *li*nts. In * r***nt `**str**tS*ssionList*n*r` ***n**, t** r*spons* mi**t now *ont*in * `S*t-*ooki*` ***

Reasoning

T** vuln*r**ility st*ms *rom t** *TTP ***** syst*m storin* r*spons*s wit* 'S*t-*ooki*' *****rs. T** p*t** mo*i*i*s t** Stor* *l*ss *onstru*tor to ****pt priv*t* *****rs *n* ***s lo*i* in t** writ* m*t*o* to r*mov* t**m. T** pr*-p*t** v*rsion o* writ*