CVE-2015-5161 – zendframework/zendxml
Package
Manager: composer
Name: zendframework/zendxml
Vulnerable Version: >=1.0.0 <1.0.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.4676 pctl0.97596
Details
ZendXml and Zend Framework contain XXE and XEE Vulnerabilities The `Zend_Xml_Security::scan` in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters.
Metadata
Created: 2022-05-17T03:16:37Z
Modified: 2023-08-03T21:53:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-xp8p-9rq5-4wgv/GHSA-xp8p-9rq5-4wgv.json
CWE IDs: ["CWE-611", "CWE-776"]
Alternative ID: GHSA-xp8p-9rq5-4wgv
Finding: F083
Auto approve: 1