header-logo
Suggest Exploit
vendor:
PDOSessionHandler
by:
Exploit Database
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: PDOSessionHandler
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: N/A
2020

PDOSessionHandler Denial of Service

The PDOSessionHandler class allows to store sessions on a PDO connection. Under some configurations (see below) and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources. An application is vulnerable when it is using PDOSessionHandler to store its sessions, it uses MySQL as a backend for sessions managed by PDOSessionHandler, and the SQL mode does not contain STRICT_ALL_TABLES or STRICT_TRANS_TABLES (check via SELECT @@sql_mode).

Mitigation:

Ensure that the SQL mode contains STRICT_ALL_TABLES or STRICT_TRANS_TABLES.
Source

Exploit-DB raw data:

The PDOSessionHandler class allows to store sessions on a PDO connection. Under some configurations (see below) and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources.

An application is vulnerable when:

- It is using PDOSessionHandler to store its sessions;

- And it uses MySQL as a backend for sessions managed by PDOSessionHandler;

- And the SQL mode does not contain STRICT_ALL_TABLES or STRICT_TRANS_TABLES (check via SELECT @@sql_mode).

POC:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44768.tgz