Lucene search

K
githubGitHub Advisory DatabaseGHSA-MG4X-PRH7-G4MX
HistoryJun 07, 2024 - 10:25 p.m.

Zend-Captcha Information Disclosure and Insufficient Entropy vulnerability

2024-06-0722:25:12
CWE-331
GitHub Advisory Database
github.com
7
zend framework
zend_captcha_word
information disclosure
insufficient entropy
php
random number generation

AI Score

6.6

Confidence

Low

In Zend Framework, Zend_Captcha_Word (v1) and Zend\Captcha\Word (v2) generate a “word” for a CAPTCHA challenge by selecting a sequence of random letters from a character set. Prior to this advisory, the selection was performed using PHP’s internal array_rand() function. This function does not generate sufficient entropy due to its usage of rand() instead of more cryptographically secure methods such as openssl_pseudo_random_bytes(). This could potentially lead to information disclosure should an attacker be able to brute force the random number generation.

Affected configurations

Vulners
Node
zendframeworkzend-captchaRange2.5.02.5.2
OR
zendframeworkzend-captchaRange2.0.02.4.9
VendorProductVersionCPE
zendframeworkzend-captcha*cpe:2.3:a:zendframework:zend-captcha:*:*:*:*:*:*:*:*

AI Score

6.6

Confidence

Low