exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed

Files

PHP 5.3.2 Weak Random Number Generator
Posted Mar 30, 2010
Authored by Andreas Bogk

PHP versions 5.3.2 and below utilize a cryptographically weak random number generator to produce session ID information. Additionally, not enough entropy is used for the initial seeding of the RNG, and some of the entropy can leak by careless use of the uniqid() PHP function. Under certain circumstances, these individual weaknesses interact and reduce the number of possible values of a PHP session ID so much that exhaustive search for a valid session ID against the web server becomes feasible.

tags | advisory, web, php
SHA-256 | 8c84b573c1249141276869a59ae2230ce6a6572c58b5967a58370265274695f6
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close