Lucene search

K
osvGoogleOSV:GHSA-62F6-H68R-3JPW
HistoryJun 07, 2024 - 8:20 p.m.

Zendframework session validation vulnerability

2024-06-0720:20:21
Google
osv.dev
2
zendframework
session
validation
vulnerability
remoteaddr
httpuseragent
metadata
attackers
software.

AI Score

6.7

Confidence

Low

Zend\Session session validators do not work as expected if set prior to the start of a session.

For instance, the following test case fails (where $this->manager is an instance of Zend\Session\SessionManager):

$this
    ->manager
    ->getValidatorChain()
    ->attach('session.validate', array(new RemoteAddr(), 'isValid'));

$this->manager->start();

$this->assertSame(
    array(
        'Zend\Session\Validator\RemoteAddr' =3D> '',
    ),
    $_SESSION['__ZF']['_VALID']
);

The implication is that subsequent calls to Zend\Session\SessionManager#start() (in later requests, assuming a session was created) will not have any validator metadata attached, which causes any validator metadata to be re-built from scratch, thus marking the session as valid.

An attacker is thus able to simply ignore session validators such as RemoteAddr or HttpUserAgent, since the β€œsignature” that these validators check against is not being stored in the session.

AI Score

6.7

Confidence

Low