Zend Framework < 2.3.8 / 2.4.x < 2.4.1 HTTP Response Splitting

medium Nessus Network Monitor Plugin ID 9138

Synopsis

The remote host is using a version of Zend Framework that is vulnerable to HTTP response splitting attacks.

Description

Versions of Zend Framework earlier than 2.3.8, or 2.4.x earlier than 2.4.1 are vulnerable to a flaw in the 'Zend\Mail' and 'Zend\Http' components that is triggered as CRLF (Carriage Return and Line Feed) character sequences are not properly sanitized before being included in responses. This allows a context-dependent attacker to inject additional headers into responses to conduct HTTP response splitting attacks.

Solution

Upgrade Zend Framework to version 2.4.1 or later. If version 2.4.x is not available, version 2.3.8 is also patched for these vulnerabilities.

See Also

http://framework.zend.com

http://framework.zend.com/changelog/2.3.8

Plugin Details

Severity: Medium

ID: 9138

Family: CGI

Published: 3/15/2016

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:thomas_breuss:zend_framework_integration_zend_framework

Patch Publication Date: 5/7/2015

Vulnerability Publication Date: 5/7/2015

Reference Information

CVE: CVE-2015-3154

BID: 74561