Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xx8f-qf9f-5fgw | Remote code execution in zendframework and laminas-http |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T16:45:50.691Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-3007
No data.
Status : Modified
Published: 2021-01-04T03:15:13.527
Modified: 2024-11-21T06:20:44.207
Link: CVE-2021-3007
No data.
OpenCVE Enrichment
No data.
Github GHSA