CVE-2014-2683CVE-2014-2683

Affected configuration(s):

cpe:/a:zend:zend_framework:1.12.3
cpe:/a:zend:zend_framework:2.1.5
cpe:/a:zend:zend_framework:2.2.5
cpe:/a:zend:zendopenid:2.0.1
cpe:/a:zend:zendrest:2.0.1
cpe:/a:zend:zendservice_amazon:2.0.2
cpe:/a:zend:zendservice_api:1.0.0
cpe:/a:zend:zendservice_audioscrobbler:2.0.1
cpe:/a:zend:zendservice_nirvanix:2.0.1
cpe:/a:zend:zendservice_slideshare:2.0.1
cpe:/a:zend:zendservice_technorati:2.0.1
cpe:/a:zend:zendservice_windowsazure:2.0.1

Date published: 2014-11-15T19:59:03.920-05:00

Date last modified: 2017-11-03T21:29:00.910-04:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://advisories.mageia.org/MGASA-2014-0151.html

Summary: Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0 allow remote attackers to cause a denial of service (CPU consumption) via (1) recursive or (2) circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack. NOTE: this issue exists because of an incomplete fix for CVE-2012-6532.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.