Cross-site scripting in Zend Framework - CVE-2012-4451
Published: January 3, 2020 / Updated: July 17, 2020
Zend Framework
Detailed vulnerability description
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in Zend Framework 2.0.x before 2.0.1 when processing unspecified input to (1) Debug, (2) FeedPubSubHubbub, (3) LogFormatterXml, (4) TagCloudDecorator, (5) Uri, (6) ViewHelperHeadStyle, (7) ViewHelperNavigationSitemap, or (8) ViewHelperPlaceholderContainerAbstractStandalone, related to Escaper. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
How to mitigate CVE-2012-4451
Sources
- http://framework.zend.com/security/advisory/ZF2012-03
- http://seclists.org/oss-sec/2012/q3/571
- http://seclists.org/oss-sec/2012/q3/573
- http://www.securityfocus.com/bid/55636
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688946#10
- https://bugs.gentoo.org/show_bug.cgi?id=436210
- https://bugzilla.redhat.com/show_bug.cgi?id=860738
- https://github.com/zendframework/zf2/commit/27131ca9520bdf1d4c774c71459eba32f2b10733