CVE-2024-51996:
Symfony has an Authentication Bypass via RememberMe
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.15005%
CWE
Published
11/13/2024
Updated
11/14/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
symfony/security-http | composer | >= 5.3.0, < 5.4.47 | 5.4.47 |
symfony/security-http | composer | >= 6.0.0-BETA1, < 6.4.15 | 6.4.15 |
symfony/security-http | composer | >= 7.0.0-BETA1, < 7.1.8 | 7.1.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the lack of username/class validation in the cookie consumption process. The commit diff shows critical security checks were added to PersistentRememberMeHandler.php's consumeRememberMeCookie method, specifically comparing getUserIdentifier() and getClass() between the cookie data and database record. The original code (before patch) did not perform these checks, making this function the entry point for the authentication bypass. The test cases added in PersistentRememberMeHandlerTest.php also validate this scenario by checking for invalid owners/cookie values.