CVE-2018-11407
Published: 13 June 2018
An issue was discovered in the Ldap component in Symfony 2.8.x before 2.8.37, 3.3.x before 3.3.17, 3.4.x before 3.4.7, and 4.0.x before 4.0.7. It allows remote attackers to bypass authentication by logging in with a "null" password and valid username, which triggers an unauthenticated bind. NOTE: this issue exists because of an incomplete fix for CVE-2016-2403.
From the Ubuntu Security Team
It was discovered that Symfony allowed unauthorized access on a misconfigured LDAP server. A remote attacker could use this vulnerability to gain unauthorized access.
Priority
Status
Package | Release | Status |
---|---|---|
symfony Launchpad, Ubuntu, Debian |
hirsute |
Not vulnerable
(3.4.15+dfsg-2ubuntu4)
|
jammy |
Not vulnerable
(3.4.15+dfsg-2ubuntu4)
|
|
artful |
Ignored
(end of life)
|
|
bionic |
Released
(3.4.6+dfsg-1ubuntu0.1+esm1)
Available with Ubuntu Pro |
|
cosmic |
Not vulnerable
(3.4.15+dfsg-2ubuntu4)
|
|
disco |
Not vulnerable
(3.4.15+dfsg-2ubuntu4)
|
|
eoan |
Not vulnerable
(3.4.15+dfsg-2ubuntu4)
|
|
focal |
Not vulnerable
(3.4.15+dfsg-2ubuntu4)
|
|
groovy |
Not vulnerable
(3.4.15+dfsg-2ubuntu4)
|
|
impish |
Not vulnerable
(3.4.15+dfsg-2ubuntu4)
|
|
kinetic |
Not vulnerable
(3.4.15+dfsg-2ubuntu4)
|
|
lunar |
Not vulnerable
(3.4.15+dfsg-2ubuntu4)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(3.4.12+dfsg-1)
|
|
xenial |
Not vulnerable
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |