Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*", "matchCriteriaId": "363F096B-9543-4632-AEE7-EA8E78376EE6", "versionEndIncluding": "2.3.40", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABCF4EF8-5251-46B4-9B53-44783CD82082", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A03AAA02-DB58-42C5-B4A6-C2608CDB7123", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA4FA9-AED8-4CCB-85E4-6D0BF6776FC2", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "32021069-B447-40B2-BBF9-0D2CFDE8ECC5", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "38F01C2E-5A1B-441A-B58C-C450AA1C1410", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "660AA98C-4E93-4D8B-A4EC-A94E24DCDB9E", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "388F9E94-C2C1-4010-97DA-B008E89D500F", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "2F89AEFB-7D2C-46EF-B0FF-D8C1B636EB30", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "DA6F1CF5-F8A5-43E2-B9C4-912A0583E558", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "5AA4F511-1DFF-4705-9752-D0A35A6B3421", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "8176FACA-64A3-40C3-AD08-EA5840E5FEDF", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "3B18C5B9-F80D-460C-A65B-2445ED71119F", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "34D7BE55-A7CC-4BA5-B776-02A63707BBB1", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C01C2E25-6FEE-49C8-A9D8-F4935A0F915E", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "68869331-57A0-451D-9888-32643537B736", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "3598D2C0-4AB1-4C4F-98ED-2862E7C42497", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "9F100F2F-EB9F-41E3-AB84-49E49A61C728", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "135156B2-2ADF-4127-A4F1-309FB99868B8", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:2.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "AABE15FF-B488-49D6-B284-89ECE1C2E54C", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D07C355A-FF00-44DF-A899-B727DAEBB83F", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "235F1F79-E3FB-452C-98E3-A3D978CC9819", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FC270EEB-02CC-4960-9F3D-41AB86636864", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C1570191-3967-4C89-B7B3-07C4FC369C95", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "1FC56E52-31DB-4B3C-8E07-B7358079DEC9", "vulnerable": true}, {"criteria": "cpe:2.3:a:sensiolabs:symfony:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "CE067114-08AF-46F0-8F46-1485C93A8857", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The attemptAuthentication function in Component/Security/Http/Firewall/UsernamePasswordFormAuthenticationListener.php in Symfony before 2.3.41, 2.7.x before 2.7.13, 2.8.x before 2.8.6, and 3.0.x before 3.0.6 does not limit the length of a username stored in a session, which allows remote attackers to cause a denial of service (session storage consumption) via a series of authentication attempts with long, non-existent usernames."}, {"lang": "es", "value": "La funci\u00f3n attemptAuthentication en Component/Security/Http/Firewall/UsernamePasswordFormAuthenticationListener.php en Symfony en versiones anteriores a 2.3.41, 2.7.x en versiones anteriores a 2.7.13, 2.8.x en versiones anteriores a 2.8.6 y 3.0.x en versiones anteriores a 3.0.6 no limita la longitud de un nombre de usuario almacenado en una sesi\u00f3n, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de almacenamiento de sesi\u00f3n) a trav\u00e9s de una series de intentos de autenticaci\u00f3n con nombres de usuario largos que no existen."}], "id": "CVE-2016-4423", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-06-01T22:59:02.457", "references": [{"source": "cve@mitre.org", "url": "http://www.debian.org/security/2016/dsa-3588"}, {"source": "cve@mitre.org", "url": "https://github.com/symfony/symfony/pull/18733"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://symfony.com/blog/cve-2016-4423-large-username-storage-in-session"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3588"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/symfony/symfony/pull/18733"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://symfony.com/blog/cve-2016-4423-large-username-storage-in-session"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-399"}], "source": "nvd@nist.gov", "type": "Primary"}]}