CVE-2021-30492 – zendesk/zendesk_api_client_php
Package
Manager: composer
Name: zendesk/zendesk_api_client_php
Vulnerable Version: >=0 <2.2.11
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:H/SI:H/SA:L
EPSS: N/A pctlN/A
Details
Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain ### Impact Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF). ### Resolution Validate the provided Zendesk subdomain to be a valid subdomain in: * getAuthUrl * getAccessToken
Metadata
Created: 2021-04-29T21:53:06Z
Modified: 2021-04-28T22:29:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-q348-f93x-9gx4/GHSA-q348-f93x-9gx4.json
CWE IDs: ["CWE-20", "CWE-918"]
Alternative ID: GHSA-q348-f93x-9gx4
Finding: F100
Auto approve: 1