GHSA-f4fj-q6m4-cc52: ZendFramework vulnerable to XXE/XEE attacks
Numerous components utilizing PHP’s DOMDocument, SimpleXML, and xml_parse functionality are vulnerable to two types of attacks:
- XML eXternal Entity (XXE) Injection attacks. The above mentioned extensions are insecure by default, allowing external entities to be specified by adding a specific DOCTYPE element to XML documents and strings. By exploiting this vulnerability an application may be coerced to open arbitrary files and/or TCP connections.
- XML Entity Expansion (XEE) vectors, leading to Denial of Service vectors. XEE attacks occur when the XML DOCTYPE declaration includes XML entity definitions that contain either recursive or circular references; this leads to CPU and memory consumption, making Denial of Service exploits trivial to implement.
References
- framework.zend.com/security/advisory/ZF2014-01
- github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-xmlrpc/ZF2014-01.yaml
- github.com/advisories/GHSA-f4fj-q6m4-cc52
- github.com/zendframework/zend-xmlrpc
- github.com/zendframework/zend-xmlrpc/commit/0ee07bc62e32ddde2680a48fe13fd58c28a208aa
- github.com/zendframework/zend-xmlrpc/commit/204ccbee883487e4873bce89278c48e370c21a63
- github.com/zendframework/zend-xmlrpc/commit/27201f2c48acb3ab6135e8772211d9cb707693d6
- github.com/zendframework/zend-xmlrpc/commit/48f20929f93df4a79254c85155aaebbbe330dc93
- github.com/zendframework/zend-xmlrpc/commit/7a42486b63797a37af5c26be1bd3d4fb235a5939
- github.com/zendframework/zend-xmlrpc/commit/93376258630eab4823cd5009a7230e17073feed8
Detect and mitigate GHSA-f4fj-q6m4-cc52 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →