Insufficient Session Validation Affecting zendframework/zendframework package, versions >=2.3.0, <2.3.4>=2, <2.2.9


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficient Session Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-ZENDFRAMEWORKZENDFRAMEWORK-70329
  • published14 Jan 2015
  • disclosed14 Jan 2015
  • creditYuriy Dyachenko

Introduced: 14 Jan 2015

CVE NOT AVAILABLE CWE-284  (opens in a new tab)

How to fix?

Upgrade zendframework/zendframework to version 2.3.4, 2.2.9 or higher.

Overview

Affected versions of zendframework/zendframework are vulnerable to Insufficient Session Validation.

Zend\Session session validators do not work as expected if set prior to the start of a session.

The implication is that subsequent calls to Zend\Session\SessionManager#start() (in later requests, assuming a session was created) will not have any validator metadata attached, which causes any validator metadata to be re-built from scratch, thus marking the session as valid.

An attacker is thus able to simply ignore session validators such as RemoteAddr or HttpUserAgent, since the "signature" that these validators check against is not being stored in the session.

CVSS Scores

version 3.1