Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-848f-mph5-9pm9: Zendframework Potential Information Disclosure and Insufficient Entropy vulnerability

In Zend Framework, Zend_Captcha_Word (v1) and Zend\Captcha\Word (v2) generate a “word” for a CAPTCHA challenge by selecting a sequence of random letters from a character set. Prior to this advisory, the selection was performed using PHP’s internal array_rand() function. This function does not generate sufficient entropy due to its usage of rand() instead of more cryptographically secure methods such as openssl_pseudo_random_bytes(). This could potentially lead to information disclosure should an attacker be able to brute force the random number generation.

ghsa
#vulnerability#git#php#ssl
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-848f-mph5-9pm9

Zendframework Potential Information Disclosure and Insufficient Entropy vulnerability

High severity GitHub Reviewed Published Jun 7, 2024 to the GitHub Advisory Database • Updated Jun 7, 2024

Package

composer zendframework/zendframework1 (Composer)

Affected versions

>= 1.12.0, < 1.12.17

Published to the GitHub Advisory Database

Jun 7, 2024

ghsa: Latest News

GHSA-pj33-75x5-32j4: RabbitMQ HTTP API's queue deletion endpoint does not verify that the user has a required permission