Input validation error in Zend Framework - CVE-2012-6531

 

Input validation error in Zend Framework - CVE-2012-6531

Published: February 13, 2013 / Updated: August 11, 2020


Vulnerability identifier: #VU43094
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2012-6531
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Zend
Affected software:
Zend Framework

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

(1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.


How to mitigate CVE-2012-6531

Install update from vendor's website.

Sources