CVE-2014-2682CVE-2014-2682

Affected configuration(s):

cpe:/a:zend:zend_framework:1.12.3
cpe:/a:zend:zend_framework:2.1.5
cpe:/a:zend:zend_framework:2.2.5
cpe:/a:zend:zendopenid:2.0.1
cpe:/a:zend:zendrest:2.0.1
cpe:/a:zend:zendservice_amazon:2.0.2
cpe:/a:zend:zendservice_api:1.0.0
cpe:/a:zend:zendservice_audioscrobbler:2.0.1
cpe:/a:zend:zendservice_nirvanix:2.0.1
cpe:/a:zend:zendservice_slideshare:2.0.1
cpe:/a:zend:zendservice_technorati:2.0.1
cpe:/a:zend:zendservice_windowsazure:2.0.1

Date published: 2014-11-15T19:59:02.827-05:00

Date last modified: 2017-11-03T21:29:00.833-04:00

CVSS Score: 6.8

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://advisories.mageia.org/MGASA-2014-0151.html

Summary: Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0, when PHP-FPM is used, does not properly share the libxml_disable_entity_loader setting between threads, which might allow remote attackers to conduct XML External Entity (XXE) attacks via an XML external entity declaration in conjunction with an entity reference. NOTE: this issue exists because of an incomplete fix for CVE-2012-5657.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.