An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before
2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13.
DefaultAuthenticationSuccessHandler or DefaultAuthenticationFailureHandler
takes the content of the _target_path parameter and generates a redirect
response, but no check is performed on the path, which could be an absolute
URL to an external domain. This Open redirect vulnerability can be
exploited for example to mount effective phishing attacks.
Upstream:released (3.4.0+dfsg-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (3.4.6+dfsg-1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (3.4.15+dfsg-2ubuntu4)
Ubuntu 19.04 (Disco Dingo):not-affected (3.4.15+dfsg-2ubuntu4)
More Information

Updated: 2019-01-14 21:24:43 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)