CVE-2022-24894

NameCVE-2022-24894
DescriptionSymfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony HTTP cache system, acts as a reverse proxy: It caches entire responses (including headers) and returns them to the clients. In a recent change in the `AbstractSessionListener`, the response might contain a `Set-Cookie` header. If the Symfony HTTP cache system is enabled, this response might bill stored and return to the next clients. An attacker can use this vulnerability to retrieve the victim's session. This issue has been patched and is available for branch 4.4.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3493-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
symfony (PTS)bullseye4.4.19+dfsg-2+deb11u5fixed
bookworm5.4.23+dfsg-1+deb12u2fixed
sid, trixie6.4.7+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
symfonysourcebuster3.4.22+dfsg-2+deb10u2DLA-3493-1
symfonysourcebullseye4.4.19+dfsg-2+deb11u2
symfonysource(unstable)5.4.20+dfsg-1

Notes

https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv
https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb

Search for package or bug name: Reporting problems