(1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-251-1 | zendframework security update |
Debian DLA |
DLA-251-2 | zendframework regression update |
EUVD |
EUVD-2022-4074 | (1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363. |
Github GHSA |
GHSA-h5p3-7mg6-hgj4 | Zend Framework XEE Vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T19:56:53.099Z
Reserved: 2013-02-13T00:00:00Z
Link: CVE-2012-6531
No data.
Status : Deferred
Published: 2013-02-13T17:55:01.417
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-6531
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA