logo

CVE-2021-3007 laminas/laminas-http

Package

Manager: composer
Name: laminas/laminas-http
Vulnerable Version: >=0 <2.14.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.79527 pctl0.99053

Details

Remote code execution in zendframework and laminas-http Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized.

Metadata

Created: 2021-06-08T20:11:19Z
Modified: 2024-04-22T19:04:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-xx8f-qf9f-5fgw/GHSA-xx8f-qf9f-5fgw.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-xx8f-qf9f-5fgw
Finding: F096
Auto approve: 1