Symphony Denial of Service Via Overlong Usernames
High severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Apr 25, 2024
Package
Affected versions
>= 2.3.0, < 2.3.41
>= 2.4.0, < 2.7.13
>= 2.8.0, < 2.8.6
>= 3.0.0, < 3.0.6
Patched versions
2.3.41
2.7.13
2.8.6
3.0.6
>= 2.3.0, < 2.3.41
>= 2.4.0, < 2.7.13
>= 2.8.0, < 2.8.6
>= 3.0.0, < 3.0.6
2.3.41
2.7.13
2.8.6
3.0.6
>= 2.3.0, < 2.3.41
>= 2.4.0, < 2.7.13
>= 2.8.0, < 2.8.6
>= 3.0.0, < 3.0.6
2.3.41
2.7.13
2.8.6
3.0.6
Description
Published by the National Vulnerability Database
Jun 1, 2016
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Apr 25, 2024
Last updated
Apr 25, 2024
The attemptAuthentication function in
Component/Security/Http/Firewall/UsernamePasswordFormAuthenticationListener.php
in Symfony before 2.3.41, 2.7.x before 2.7.13, 2.8.x before 2.8.6, and 3.0.x before 3.0.6 does not limit the length of a username stored in a session, which allows remote attackers to cause a denial of service (session storage consumption) via a series of authentication attempts with long, non-existent usernames.References