Cross-site scripting in Zend Framework - CVE-2012-4451

 

Cross-site scripting in Zend Framework - CVE-2012-4451

Published: January 3, 2020 / Updated: July 17, 2020


Vulnerability identifier: #VU30467
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear
CVE-ID: CVE-2012-4451
CWE-ID: CWE-79
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Zend
Affected software:
Zend Framework

Detailed vulnerability description

Vulnerability allows a remote attacker to perform XSS attacks.

The vulnerability is caused by an input validation error in Zend Framework 2.0.x before 2.0.1 when processing unspecified input to (1) Debug, (2) FeedPubSubHubbub, (3) LogFormatterXml, (4) TagCloudDecorator, (5) Uri, (6) ViewHelperHeadStyle, (7) ViewHelperNavigationSitemap, or (8) ViewHelperPlaceholderContainerAbstractStandalone, related to Escaper. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


How to mitigate CVE-2012-4451

Update to version 2.0.1.

Sources