Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. zendframework/zend-session
  4. ›
  5. GHSA-96c6-m98x-hxjx

GHSA-96c6-m98x-hxjx: Zend-Session session validation vulnerability

June 7, 2024

Zend\Session session validators do not work as expected if set prior to the start of a session.

For instance, the following test case fails (where $this->manager is an instance of Zend\Session\SessionManager):

$this
->manager
->getValidatorChain()
->attach('session.validate', array(new RemoteAddr(), 'isValid'));

$this->manager->start();

$this->assertSame(
array(
'Zend\Session\Validator\RemoteAddr' =3D> '',
),
$_SESSION['__ZF']['_VALID']
);

The implication is that subsequent calls to Zend\Session\SessionManager#start() (in later requests, assuming a session was created) will not have any validator metadata attached, which causes any validator metadata to be re-built from scratch, thus marking the session as valid.

An attacker is thus able to simply ignore session validators such as RemoteAddr or HttpUserAgent, since the “signature” that these validators check against is not being stored in the session.

References

  • framework.zend.com/security/advisory/ZF2015-01
  • github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-session/ZF2015-01.yaml
  • github.com/advisories/GHSA-96c6-m98x-hxjx
  • github.com/zendframework/zend-session
  • github.com/zendframework/zend-session/commit/05fa95488b5ade513c4dcc56051a7ddb1c94f341
  • github.com/zendframework/zend-session/commit/1272fc047121720130690c324413629d8f63d210
  • github.com/zendframework/zend-session/commit/35014ab0ae17c2a169320f182697ee9fe73d841e
  • github.com/zendframework/zend-session/commit/3b1a65b3193a4219f5c4259ab8735f9ad254a021
  • github.com/zendframework/zend-session/commit/6a27a9fddd8f5b12b3af0de6309181ff5946dd0e
  • github.com/zendframework/zend-session/commit/7c4b73dd64e01001946aac76c6deddfe1c6ef0be
  • github.com/zendframework/zend-session/commit/7fc94bd6a60342416242a3899d63072c471b33d3
  • github.com/zendframework/zend-session/commit/93b43aa0ca5348d29034f67195ffa3f4082878d5
  • github.com/zendframework/zend-session/commit/9868f84513536446b0bac81cc95e0130b0a6fc9c
  • github.com/zendframework/zend-session/commit/a3382bfd3067f527762294b5fc622550988e6862
  • github.com/zendframework/zend-session/commit/b1903947e285568344b3458e4524b016ce311072
  • github.com/zendframework/zend-session/commit/ff9236cc4c4944b5f5a6fbfee01420ef82c4fa91

Code Behaviors & Features

Detect and mitigate GHSA-96c6-m98x-hxjx with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.0.0 before 2.2.9, all versions starting from 2.3.0 before 2.3.4

Fixed versions

  • 2.2.9
  • 2.3.4

Solution

Upgrade to versions 2.2.9, 2.3.4 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-384: Session Fixation

Source file

packagist/zendframework/zend-session/GHSA-96c6-m98x-hxjx.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:09 +0000.