CVE-2012-3363: Zend Framework XXE Vulnerability
(updated )
Zend_XmlRpc in Zend Framework 1.x before 1.11.12 and 1.12.x before 1.12.0 does not properly handle SimpleXMLElement classes, which allows remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack.
References
- framework.zend.com/security/advisory/ZF2012-01
- git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-34284
- lists.fedoraproject.org/pipermail/package-announce/2013-April/101310.html
- lists.fedoraproject.org/pipermail/package-announce/2013-April/101358.html
- openwall.com/lists/oss-security/2013/03/25/2
- www.debian.org/security/2012/dsa-2505
- www.openwall.com/lists/oss-security/2012/06/26/2
- www.openwall.com/lists/oss-security/2012/06/26/4
- www.openwall.com/lists/oss-security/2012/06/27/2
- github.com/advisories/GHSA-7pg4-5233-82jv
- github.com/zendframework/zf1/commit/281a3251d71ed40a5289ec4afc355eea8e014dc5
- moodle.org/mod/forum/discuss.php?d=225345
- nvd.nist.gov/vuln/detail/CVE-2012-3363
- web.archive.org/web/20170223044943/http://www.securitytracker.com/id?1027208
- www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt
Detect and mitigate CVE-2012-3363 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →