Lucene search

K
githubGitHub Advisory DatabaseGHSA-GVPP-6JRJ-5PQC
HistoryJun 07, 2024 - 9:58 p.m.

Zend-Form vulnerable to Cross-site Scripting

2024-06-0721:58:34
CWE-79
GitHub Advisory Database
github.com
7
zend framework 2
view helpers
escapehtml
escapehtmlattr
xss
attack
vulnerability
javascript
attributes
software

AI Score

5.8

Confidence

High

Many Zend Framework 2 view helpers were using the escapeHtml() view helper in order to escape HTML attributes, instead of the more appropriate escapeHtmlAttr(). In situations where user data and/or JavaScript is used to seed attributes, this can lead to potential cross site scripting (XSS) attack vectors.

Vulnerable view helpers include:

  • All Zend\Form view helpers.
  • Most Zend\Navigation (aka Zend\View\Helper\Navigation\*) view helpers.
  • All β€œHTML Element” view helpers: htmlFlash(), htmlPage(), htmlQuickTime().
  • Zend\View\Helper\Gravatar

Affected configurations

Vulners
Node
zendframeworkzend-formRange2.3.0–2.3.1
OR
zendframeworkzend-formRange2.0.0–2.2.7
VendorProductVersionCPE
zendframeworkzend-form*cpe:2.3:a:zendframework:zend-form:*:*:*:*:*:*:*:*

AI Score

5.8

Confidence

High