CVE-2012-3363
Severity CVSS v4.0:
Pending analysis
Type:
CWE-611
Improper Restriction of XML External Entity Reference ('XXE')
Publication date:
13/02/2013
Last modified:
15/02/2024
Description
Zend_XmlRpc in Zend Framework 1.x before 1.11.12 and 1.12.x before 1.12.0 does not properly handle SimpleXMLElement classes, which allows remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack.
Impact
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Base Score 2.0
6.40
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:* | 1.0.0 (including) | 1.11.12 (excluding) |
cpe:2.3:a:zend:zend_framework:1.12.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:zend:zend_framework:1.12.0:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:zend:zend_framework:1.12.0:rc3:*:*:*:*:*:* | ||
cpe:2.3:a:zend:zend_framework:1.12.0:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://framework.zend.com/security/advisory/ZF2012-01
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-34284
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101310.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101358.html
- http://openwall.com/lists/oss-security/2013/03/25/2
- http://www.debian.org/security/2012/dsa-2505
- http://www.openwall.com/lists/oss-security/2012/06/26/2
- http://www.openwall.com/lists/oss-security/2012/06/26/4
- http://www.openwall.com/lists/oss-security/2012/06/27/2
- http://www.securitytracker.com/id?1027208=
- https://moodle.org/mod/forum/discuss.php?d=225345
- https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt