CVE-2012-6531

critical

Description

(1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.

References

https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt

http://www.openwall.com/lists/oss-security/2012/06/27/2

http://www.openwall.com/lists/oss-security/2012/06/26/4

http://www.openwall.com/lists/oss-security/2012/06/26/2

http://www.debian.org/security/2012/dsa-2505

http://framework.zend.com/security/advisory/ZF2012-01

Details

Source: Mitre, NVD

Published: 2013-02-13

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Critical