GHSA-3x57-m5p4-rgh4: ZendOpenID potential security issue in login mechanism
7.5
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
6/7/2024
Updated
6/7/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
zendframework/zendopenid | composer | >= 2.0.0, < 2.0.2 | 2.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from incomplete signature validation in the verify method. The patch adds 1) a check for association between op_endpoint and assoc_handle, and 2) validation that all parameters in _signParams array (and claimed_id/identity when present) are included in the signed parameters. The pre-patch version lacked these checks, enabling the described authentication bypass. The function's role in processing OpenID responses and the specific security-focused changes in the commit confirm this as the vulnerable entry point.