Moderate severityNVD Advisory· Published Jun 2, 2015· Updated May 6, 2026
CVE-2015-4050
CVE-2015-4050
Description
FragmentListener in the HttpKernel component in Symfony 2.3.19 through 2.3.28, 2.4.9 through 2.4.10, 2.5.4 through 2.5.11, and 2.6.0 through 2.6.7, when ESI or SSI support enabled, does not check if the _controller attribute is set, which allows remote attackers to bypass URL signing and security rules by including (1) no hash or (2) an invalid hash in a request to /_fragment.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
symfony/http-kernelPackagist | >= 2.3.19, < 2.3.29 | 2.3.29 |
symfony/http-kernelPackagist | >= 2.5.4, < 2.5.12 | 2.5.12 |
symfony/http-kernelPackagist | >= 2.6.0, < 2.6.8 | 2.6.8 |
symfony/symfonyPackagist | >= 2.3.19, < 2.3.29 | 2.3.29 |
symfony/symfonyPackagist | >= 2.4.9, <= 2.4.10 | — |
symfony/symfonyPackagist | >= 2.5.4, < 2.5.12 | 2.5.12 |
symfony/symfonyPackagist | >= 2.6.0, < 2.6.8 | 2.6.8 |
symfony/http-kernelPackagist | >= 2.4.9, <= 2.4.10 | — |
Affected products
27cpe:2.3:a:sensiolabs:symfony:2.3.19:*:*:*:*:*:*:*+ 26 more
- cpe:2.3:a:sensiolabs:symfony:2.3.19:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.3.20:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.3.21:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.3.22:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.3.23:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.3.24:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.3.25:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.3.26:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.3.27:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.3.28:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:sensiolabs:symfony:2.6.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- symfony.com/blog/cve-2015-4050-esi-unauthorized-accessnvdVendor AdvisoryWEB
- github.com/advisories/GHSA-qmqw-mpqp-mr54ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2015-4050ghsaADVISORY
- lists.fedoraproject.org/pipermail/package-announce/2015-June/159513.htmlnvdWEB
- lists.fedoraproject.org/pipermail/package-announce/2015-June/159603.htmlnvdWEB
- lists.fedoraproject.org/pipermail/package-announce/2015-June/159610.htmlnvdWEB
- www.debian.org/security/2015/dsa-3276nvdWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-kernel/CVE-2015-4050.yamlghsaWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2015-4050.yamlghsaWEB
- symfony.com/cve-2015-4050ghsaWEB
- web.archive.org/web/20200228090443/http://www.securityfocus.com/bid/74928ghsaWEB
- www.securityfocus.com/bid/74928nvd
News mentions
0No linked articles in our index yet.