CVE-2023-3247

In PHP versions 8.0.* before 8.0.29, 8.1.* before 8.1.20, 8.2.* before 8.2.7 when using SOAP HTTP Digest Authentication, random value generator was not checked for failure, and was using narrower range of values than it should have. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client's nonce. 
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

01 Aug 2023, 16:38

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CWE CWE-330
References (MISC) https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw - (MISC) https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw - Patch, Vendor Advisory
CPE cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

22 Jul 2023, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-22 05:15

Updated : 2024-02-05 00:01


NVD link : CVE-2023-3247

Mitre link : CVE-2023-3247

CVE.ORG link : CVE-2023-3247


JSON object : View

Products Affected

php

  • php
CWE
CWE-330

Use of Insufficiently Random Values

CWE-252

Unchecked Return Value