Lucene search

K
githubGitHub Advisory DatabaseGHSA-5GMF-3C43-Q73V
HistoryJun 07, 2024 - 8:50 p.m.

ZendFramework vulnerable to Cross-site Scripting

2024-06-0720:50:55
CWE-79
GitHub Advisory Database
github.com
5
zendframework
cross-site scripting
xss
escaper
html
url
security

AI Score

6.2

Confidence

High

Zend\Debug, Zend\Feed\PubSubHubbub, Zend\Log\Formatter\Xml, Zend\Tag\Cloud\Decorator, Zend\Uri, Zend\View\Helper\HeadStyle, Zend\View\Helper\Navigation\Sitemap, and Zend\View\Helper\Placeholder\Container\AbstractStandalone were not using Zend\Escaper when escaping HTML, HTML attributes, and/or URLs. While most were performing some escaping, because they were not using context-appropriate escaping mechanisms, they could potentially be exploited to perform Cross Site Scripting (XSS) attacks.

Affected configurations

Vulners
Node
zendframeworkzendframeworkRange2.0.02.0.1
VendorProductVersionCPE
zendframeworkzendframework*cpe:2.3:a:zendframework:zendframework:*:*:*:*:*:*:*:*

References

AI Score

6.2

Confidence

High