GHSA-5gmf-3c43-q73v: ZendFramework vulnerable to Cross-site Scripting
Zend\Debug
, Zend\Feed\PubSubHubbub
, Zend\Log\Formatter\Xml
, Zend\Tag\Cloud\Decorator
, Zend\Uri
, Zend\View\Helper\HeadStyle, Zend\View\Helper\Navigation\Sitemap
, and Zend\View\Helper\Placeholder\Container\AbstractStandalone
were not using Zend\Escaper
when escaping HTML, HTML attributes, and/or URLs. While most were performing some escaping, because they were not using context-appropriate escaping mechanisms, they could potentially be exploited to perform Cross Site Scripting (XSS) attacks.
References
- framework.zend.com/security/advisory/ZF2012-03
- github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zendframework/ZF2012-03.yaml
- github.com/advisories/GHSA-5gmf-3c43-q73v
- github.com/zendframework/zendframework
- github.com/zendframework/zendframework/commit/07d847b705911da6a15257f64895f69cab7ad50c
- github.com/zendframework/zendframework/commit/0a78cb2b633a618ac514eadef2c19ef78b1e12f2
- github.com/zendframework/zendframework/commit/27131ca9520bdf1d4c774c71459eba32f2b10733
- github.com/zendframework/zendframework/commit/6791343f8c8cd1948315a87eb15e16b57e08bc71
- github.com/zendframework/zendframework/commit/6f57175753a238388b4811b9b0786b6d5866a208
- github.com/zendframework/zendframework/commit/7f48d9edf82bcd7ece9d189d836682be83d08e91
- github.com/zendframework/zendframework/commit/a36406ddea52fd294b291310be00c526df6b713a
- github.com/zendframework/zendframework/commit/ad3628bc2c05c297af4492330885d49f373e1e91
Detect and mitigate GHSA-5gmf-3c43-q73v with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →