In Zend Framework, ZendCaptchaWord (v1) and Zend\Captcha\Word (v2) generate a "word" for a CAPTCHA challenge by selecting a sequence of random letters from a character set. Prior to this advisory, the selection was performed using PHP's internal arrayrand() function. This function does not generate sufficient entropy due to its usage of rand() instead of more cryptographically secure methods such as opensslpseudorandombytes(). This could potentially lead to information disclosure should an attacker be able to brute force the random number generation.
{ "nvd_published_at": null, "cwe_ids": [ "CWE-331" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-06-07T22:27:02Z" }