
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A session validation vulnerability was discovered in Zend Framework's Session component (zendframework/zend-session). The vulnerability affects versions 2.0.0 through 2.2.8 and 2.3.0 through 2.3.3, and was disclosed on January 14, 2015. The issue occurs when session validators are set prior to starting a session, causing the validators to not work as expected (Zend Advisory).
The vulnerability stems from session validators not functioning properly when set before session initialization. When validators like RemoteAddr or HttpUserAgent are set prior to session start, the validator metadata is not properly stored in the session. This causes subsequent calls to Zend\Session\SessionManager#start() to rebuild validator metadata from scratch, incorrectly marking the session as valid. The technical impact is that validator signatures are not being stored in the session, effectively nullifying the security checks (Zend Advisory).
The vulnerability allows attackers to bypass session validators such as RemoteAddr or HttpUserAgent since the signature that these validators check against is not being stored in the session. This means that security checks meant to validate the session based on IP address or user agent can be circumvented (Zend Advisory).
The issue has been fixed by storing the signature of validators in the session immediately following the call to session_start(), preventing any data loss from session validators. Users are recommended to upgrade to Zend Framework versions 2.2.9 or 2.3.4 or later. For those using session validators, immediate upgrade is strongly recommended (Zend Advisory).
The Zend Framework team acknowledged Yuriy Dyachenko for reporting the issue and Marco Pivetta for providing the patch that resolved the vulnerability (Zend Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”