Miggo Logo

GHSA-3x57-m5p4-rgh4: ZendOpenID potential security issue in login mechanism

7.5

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
6/7/2024
Updated
6/7/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
zendframework/zendopenidcomposer>= 2.0.0, < 2.0.22.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from incomplete signature validation in the verify method. The patch adds 1) a check for association between op_endpoint and assoc_handle, and 2) validation that all parameters in _signParams array (and claimed_id/identity when present) are included in the signed parameters. The pre-patch version lacked these checks, enabling the described authentication bypass. The function's role in processing OpenID responses and the specific security-focused changes in the commit confirm this as the vulnerable entry point.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Usin* t** *onsum*r *ompon*nt o* Z*n*Op*nI* (or Z*n*_Op*nI* in Z**), it is possi*l* to lo*in usin* *n *r*itr*ry Op*nI* ***ount (wit*out knowin* *ny s**r*t in*orm*tion) *y usin* * m*li*ious Op*nI* Provi**r. T**t m**ns Op*nI* it is possi*l* to lo*in usi

Reasoning

T** vuln*r**ility st*ms *rom in*ompl*t* si*n*tur* v*li**tion in t** v*ri*y m*t*o*. T** p*t** ***s *) * ****k *or *sso*i*tion **tw**n op_*n*point *n* *sso*_**n*l*, *n* *) v*li**tion t**t *ll p*r*m*t*rs in _si*nP*r*ms *rr*y (*n* *l*im**_i*/i**ntity w**