CVE-2017-16652

Priority
Description
An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before
2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13.
DefaultAuthenticationSuccessHandler or DefaultAuthenticationFailureHandler
takes the content of the _target_path parameter and generates a redirect
response, but no check is performed on the path, which could be an absolute
URL to an external domain. This Open redirect vulnerability can be
exploited for example to mount effective phishing attacks.
Package
Upstream:released (3.4.0+dfsg-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Trusty/esm:DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (3.4.6+dfsg-1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (3.4.15+dfsg-2ubuntu4)
Ubuntu 19.04 (Disco Dingo):not-affected (3.4.15+dfsg-2ubuntu4)
Ubuntu 19.10 (Eoan):not-affected (3.4.15+dfsg-2ubuntu4)
More Information

Updated: 2019-04-26 14:20:39 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)