Vulnerability Description
(1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zend | Zend Framework | 1.0.4 |
Related Weaknesses (CWE)
References
- http://framework.zend.com/security/advisory/ZF2012-01Vendor Advisory
- http://www.debian.org/security/2012/dsa-2505
- http://www.openwall.com/lists/oss-security/2012/06/26/2
- http://www.openwall.com/lists/oss-security/2012/06/26/4
- http://www.openwall.com/lists/oss-security/2012/06/27/2
- https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt
- http://framework.zend.com/security/advisory/ZF2012-01Vendor Advisory
- http://www.debian.org/security/2012/dsa-2505
- http://www.openwall.com/lists/oss-security/2012/06/26/2
- http://www.openwall.com/lists/oss-security/2012/06/26/4
- http://www.openwall.com/lists/oss-security/2012/06/27/2
- https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt
FAQ
What is CVE-2012-6531?
CVE-2012-6531 is a vulnerability with a CVSS score of 6.4 (MEDIUM). (1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbit...
How severe is CVE-2012-6531?
CVE-2012-6531 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-6531?
Check the references section above for vendor advisories and patch information. Affected products include: Zend Zend Framework.