GHSA-qc7w-4567-84wv: Zendframework vulnerable to XXE/XEE attacks
Numerous components utilizing PHP’s DOMDocument, SimpleXML, and xml_parse functionality are vulnerable to two types of attacks:
- XML eXternal Entity (XXE) Injection attacks. The above mentioned extensions are insecure by default, allowing external entities to be specified by adding a specific DOCTYPE element to XML documents and strings. By exploiting this vulnerability an application may be coerced to open arbitrary files and/or TCP connections.
- XML Entity Expansion (XEE) vectors, leading to Denial of Service vectors. XEE attacks occur when the XML DOCTYPE declaration includes XML entity definitions that contain either recursive or circular references; this leads to CPU and memory consumption, making Denial of Service exploits trivial to implement.
References
- framework.zend.com/security/advisory/ZF2014-01
- github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zendframework/ZF2014-01.yaml
- github.com/advisories/GHSA-qc7w-4567-84wv
- github.com/zendframework/zendframework
- github.com/zendframework/zendframework/commit/225a8c9f1c3bc08c0bddf22486a8a39ff7186ac1
- github.com/zendframework/zendframework/commit/5dab7b8e77741dbba56209616b7815bb04f4c561
- github.com/zendframework/zendframework/commit/68d0756c596baeefad0b733b42ef2657d09c7f4e
- github.com/zendframework/zendframework/commit/bbcf41e676ef6d8f16ea9d6499050bca0787eb6c
- github.com/zendframework/zendframework/commit/ee7f81cc996fb1c16c7dae23eca9ec013ab74730
- github.com/zendframework/zendframework/commit/fbeba98d5a9924b026a5dd98f679143fd6be89ea
Detect and mitigate GHSA-qc7w-4567-84wv with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →