Zend-Captcha Information Disclosure and Insufficient Entropy vulnerability
High severity
GitHub Reviewed
Published
Jun 7, 2024
to the GitHub Advisory Database
Package
Affected versions
>= 2.0.0, < 2.4.9
>= 2.5.0, < 2.5.2
Patched versions
2.4.9
2.5.2
Description
Published to the GitHub Advisory Database
Jun 7, 2024
Reviewed
Jun 7, 2024
In Zend Framework,
Zend_Captcha_Word
(v1) andZend\Captcha\Word
(v2) generate a "word" for a CAPTCHA challenge by selecting a sequence of random letters from a character set. Prior to this advisory, the selection was performed using PHP's internalarray_rand()
function. This function does not generate sufficient entropy due to its usage of rand() instead of more cryptographically secure methods such asopenssl_pseudo_random_bytes()
. This could potentially lead to information disclosure should an attacker be able to brute force the random number generation.References