Lucene search

K
githubGitHub Advisory DatabaseGHSA-F4FJ-Q6M4-CC52
HistoryJun 07, 2024 - 9:10 p.m.

ZendFramework vulnerable to XXE/XEE attacks

2024-06-0721:10:24
CWE-611
CWE-776
GitHub Advisory Database
github.com
8
zendframework
xxe
xee
xml
domdocument
simplexml
php
vulnerability
denialofservice
tcpconnections
security

AI Score

7.4

Confidence

High

Numerous components utilizing PHP’s DOMDocument, SimpleXML, and xml_parse functionality are vulnerable to two types of attacks:

  • XML eXternal Entity (XXE) Injection attacks. The above mentioned extensions are insecure by default, allowing external entities to be specified by adding a specific DOCTYPE element to XML documents and strings. By exploiting this vulnerability an application may be coerced to open arbitrary files and/or TCP connections.
  • XML Entity Expansion (XEE) vectors, leading to Denial of Service vectors. XEE attacks occur when the XML DOCTYPE declaration includes XML entity definitions that contain either recursive or circular references; this leads to CPU and memory consumption, making Denial of Service exploits trivial to implement.

Affected configurations

Vulners
Node
zendframeworkzend-xmlrpcRange2.2.02.2.6
OR
zendframeworkzend-xmlrpcRange2.1.02.1.6
VendorProductVersionCPE
zendframeworkzend-xmlrpc*cpe:2.3:a:zendframework:zend-xmlrpc:*:*:*:*:*:*:*:*

AI Score

7.4

Confidence

High