Many Zend Framework 2 view helpers were using the escapeHtml()
view helper in order to escape HTML attributes, instead of the more appropriate escapeHtmlAttr()
. In situations where user data and/or JavaScript is used to seed attributes, this can lead to potential cross site scripting (XSS) attack vectors.
Vulnerable view helpers include:
Zend\Form
view helpers.Zend\Navigation
(aka Zend\View\Helper\Navigation\*
) view helpers.htmlFlash()
, htmlPage()
, htmlQuickTime()
.Zend\View\Helper\Gravatar
CPE | Name | Operator | Version |
---|---|---|---|
zendframework/zendframework | lt | 2.3.1 | |
zendframework/zendframework | lt | 2.2.7 |
framework.zend.com/security/advisory/ZF2014-03
github.com/advisories/GHSA-8q77-cv62-jj38
github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zendframework/ZF2014-03.yaml
github.com/zendframework/zendframework/commit/1dd4f8cede07469390eef1e629f808349fa1b5ea
github.com/zendframework/zendframework/commit/6742ddad7a7923163cea6dd58d27d0e946a402d1