GHSA-2fhr-8r8r-qp56: ZendFramework Information Disclosure and Insufficient Entropy vulnerability
In Zend Framework, Zend_Captcha_Word
(v1) and Zend\Captcha\Word
(v2) generate a “word” for a CAPTCHA challenge by selecting a sequence of random letters from a character set. Prior to this advisory, the selection was performed using PHP’s internal array_rand()
function. This function does not generate sufficient entropy due to its usage of rand()
instead of more cryptographically secure methods such as openssl_pseudo_random_bytes()
. This could potentially lead to information disclosure should an attacker be able to brute force the random number generation.
References
- framework.zend.com/security/advisory/ZF2015-09
- github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zendframework/ZF2015-09.yaml
- github.com/advisories/GHSA-2fhr-8r8r-qp56
- github.com/zendframework/zendframework
- github.com/zendframework/zendframework/commit/ced8ff93ef892a64885c03f5dfab3f788a219709
Detect and mitigate GHSA-2fhr-8r8r-qp56 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →