Input validation error in Zend Framework - CVE-2012-6531
Published: February 13, 2013 / Updated: August 11, 2020
Zend Framework
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
(1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.
How to mitigate CVE-2012-6531
Sources
- http://framework.zend.com/security/advisory/ZF2012-01
- http://www.debian.org/security/2012/dsa-2505
- http://www.openwall.com/lists/oss-security/2012/06/26/2
- http://www.openwall.com/lists/oss-security/2012/06/26/4
- http://www.openwall.com/lists/oss-security/2012/06/27/2
- https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt