Skip to content

Conversation

@murataslan1
Copy link

Summary

Add a new secret detection rule for the old default Symfony secret key ThisTokenIsNotSoSecretChangeIt.

Details

When projects were bootstrapped with older versions of Symfony (< 4.0), the configuration was generated with a default secret key. This key can be exploited for Remote Code Execution (RCE).

Changes

  • Added CategorySymfony to secret categories
  • Added symfony-secret rule to detect ThisTokenIsNotSoSecretChangeIt
  • Severity: HIGH (due to RCE risk)

Detection examples

# parameters.yml
parameters:
    secret: ThisTokenIsNotSoSecretChangeIt
# .env
APP_SECRET=ThisTokenIsNotSoSecretChangeIt

References

Add a new secret detection rule for the old default Symfony secret key
'ThisTokenIsNotSoSecretChangeIt'. This key was used in older versions
of Symfony and can be exploited for Remote Code Execution (RCE).

Reference: https://www.ambionics.io/blog/symfony-secret-fragment

Fixes aquasecurity#3910
@CLAassistant
Copy link

CLAassistant commented Dec 6, 2025

CLA assistant check
All committers have signed the CLA.

@CLAassistant
Copy link

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Detect old default Symfony secret key ThisTokenIsNotSoSecretChangeIt

2 participants