logo

CVE-2012-6531 zendframework/zendframework1

Package

Manager: composer
Name: zendframework/zendframework1
Vulnerable Version: >=1.0 <1.11.13 || >=1.12.0-rc1 <1.12.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00905 pctl0.74867

Details

Zend Framework XEE Vulnerability (1) `Zend_Dom`, (2) `Zend_Feed`, and (3) `Zend_Soap` in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.

Metadata

Created: 2022-05-17T05:14:21Z
Modified: 2024-01-12T19:50:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-h5p3-7mg6-hgj4/GHSA-h5p3-7mg6-hgj4.json
CWE IDs: ["CWE-776"]
Alternative ID: GHSA-h5p3-7mg6-hgj4
Finding: F083
Auto approve: 1