GHSA-f4fj-q6m4-cc52 – zendframework/zend-xmlrpc
Package
Manager: composer
Name: zendframework/zend-xmlrpc
Vulnerable Version: >=2.1.0 <2.1.6 || >=2.2.0 <2.2.6
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: N/A pctlN/A
Details
ZendFramework vulnerable to XXE/XEE attacks Numerous components utilizing PHP's DOMDocument, SimpleXML, and xml_parse functionality are vulnerable to two types of attacks: - XML eXternal Entity (XXE) Injection attacks. The above mentioned extensions are insecure by default, allowing external entities to be specified by adding a specific DOCTYPE element to XML documents and strings. By exploiting this vulnerability an application may be coerced to open arbitrary files and/or TCP connections. - XML Entity Expansion (XEE) vectors, leading to Denial of Service vectors. XEE attacks occur when the XML DOCTYPE declaration includes XML entity definitions that contain either recursive or circular references; this leads to CPU and memory consumption, making Denial of Service exploits trivial to implement.
Metadata
Created: 2024-06-07T21:10:24Z
Modified: 2024-06-07T21:10:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-f4fj-q6m4-cc52/GHSA-f4fj-q6m4-cc52.json
CWE IDs: ["CWE-611", "CWE-776"]
Alternative ID: N/A
Finding: F083
Auto approve: 1