CVE-2012-5657: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
The (1) Zend_Feed_Rss and (2) Zend_Feed_Atom classes in Zend_Feed in Zend Framework 1.11.x before 1.11.15 and 1.12.x before 1.12.1 allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, and possibly cause a denial of service (CPU and memory consumption) via an XML External Entity (XXE) attack.
References
- framework.zend.com/security/advisory/ZF2012-05
- openwall.com/lists/oss-security/2012/12/20/2
- openwall.com/lists/oss-security/2012/12/20/4
- www.debian.org/security/2012/dsa-2602
- github.com/advisories/GHSA-9m5v-vq4f-mrvf
- github.com/zendframework/zf1/commit/15c84914f063efea49ea1c4425459a792cc185ea
- nvd.nist.gov/vuln/detail/CVE-2012-5657
- web.archive.org/web/20131101014013/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2013:115/?name=MDVSA-2013:115
Detect and mitigate CVE-2012-5657 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →