Lucene search

K
githubGitHub Advisory DatabaseGHSA-62F6-H68R-3JPW
HistoryJun 07, 2024 - 8:20 p.m.

Zendframework session validation vulnerability

2024-06-0720:20:21
CWE-384
GitHub Advisory Database
github.com
3
zendframework
session validation
vulnerability
sessionmanager
validatorchain
remoteaddr
httpuseragent.

AI Score

6.7

Confidence

Low

Zend\Session session validators do not work as expected if set prior to the start of a session.

For instance, the following test case fails (where $this->manager is an instance of Zend\Session\SessionManager):

$this
    ->manager
    ->getValidatorChain()
    ->attach('session.validate', array(new RemoteAddr(), 'isValid'));

$this->manager->start();

$this->assertSame(
    array(
        'Zend\Session\Validator\RemoteAddr' =3D> '',
    ),
    $_SESSION['__ZF']['_VALID']
);

The implication is that subsequent calls to Zend\Session\SessionManager#start() (in later requests, assuming a session was created) will not have any validator metadata attached, which causes any validator metadata to be re-built from scratch, thus marking the session as valid.

An attacker is thus able to simply ignore session validators such as RemoteAddr or HttpUserAgent, since the “signature” that these validators check against is not being stored in the session.

Affected configurations

Vulners
Node
zendframeworkzendframeworkRange2.3.02.3.4
OR
zendframeworkzendframeworkRange2.0.02.2.9
VendorProductVersionCPE
zendframeworkzendframework*cpe:2.3:a:zendframework:zendframework:*:*:*:*:*:*:*:*

AI Score

6.7

Confidence

Low