
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-mg4x-prh7-g4mx) affects Zend Framework's CAPTCHA implementation, specifically in Zend_Captcha_Word (v1) and Zend\Captcha\Word (v2) components. The issue was discovered and disclosed on November 23, 2015, affecting versions >= 2.0.0, < 2.4.9 and >= 2.5.0, < 2.5.2 of the zendframework/zend-captcha package (Zend Advisory).
The vulnerability stems from the use of PHP's internal array_rand() function for generating CAPTCHA words. This function relies on the rand() function, which does not provide sufficient entropy compared to more cryptographically secure methods like openssl_pseudo_random_bytes(). The issue was assigned a High severity rating with a CVSS score of 7.5, with the attack vector being Network-based, low complexity, requiring no privileges or user interaction (GitHub Advisory).
The insufficient entropy in the random number generation could potentially lead to information disclosure if an attacker successfully brute forces the random number generation process. This weakness is classified as CWE-331, impacting the security of the CAPTCHA system (GitHub Advisory).
The issue was patched in versions 2.4.9 and 2.5.2 of the zend-captcha package. The fix replaced the array_rand() calls with Zend\Math\Rand::getInteger(), which provides better random number generation. For Zend Framework 1.12.17, similar improvements were implemented using Zend_Crypt_Math::randInteger() (Zend Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."