CVE-2012-6531: Improper Input Validation
(updated )
(1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.
References
- framework.zend.com/security/advisory/ZF2012-01
- www.debian.org/security/2012/dsa-2505
- www.openwall.com/lists/oss-security/2012/06/26/2
- www.openwall.com/lists/oss-security/2012/06/26/4
- www.openwall.com/lists/oss-security/2012/06/27/2
- github.com/advisories/GHSA-h5p3-7mg6-hgj4
- github.com/zendframework/zf1/commit/1b5e86183a72b7b10b6c89e4f95f08c5da9716db
- nvd.nist.gov/vuln/detail/CVE-2012-6531
- www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt
Detect and mitigate CVE-2012-6531 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →