CVE Vulnerabilities

CVE-2018-11386

Insufficient Session Expiration

Published: Jun 13, 2018 | Modified: Nov 07, 2023
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

An issue was discovered in the HttpFoundation component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. The PDOSessionHandler class allows storing sessions on a PDO connection. Under some configurations and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Symfony Sensiolabs 2.7.0 (including) 2.7.48 (excluding)
Symfony Sensiolabs 2.8.0 (including) 2.8.41 (excluding)
Symfony Sensiolabs 3.3.0 (including) 3.3.17 (excluding)
Symfony Sensiolabs 3.4.0 (including) 3.4.11 (excluding)
Symfony Sensiolabs 4.0.0 (including) 4.0.11 (excluding)
Symfony Ubuntu artful *
Symfony Ubuntu bionic *
Symfony Ubuntu upstream *

Potential Mitigations

References