Lucene search

K
githubGitHub Advisory DatabaseGHSA-HX3M-959F-V849
HistoryJun 07, 2024 - 9:07 p.m.

ZendFramework local file inclusion vector in `Zend_View::setScriptPath()` and `render()`

2024-06-0721:07:38
CWE-22
GitHub Advisory Database
github.com
3
zendframework
local file inclusion
vulnerability
zend_view
setscriptpath
render
untrusted input
system files

7 High

AI Score

Confidence

Low

Zend_View is a component that utilizes PHP as a templating language. To utilize it, you specify β€œscript paths” that contain view scripts, and then render() view scripts by specifying subdirectories within those script paths; the output is then returned as a string value which may be cached or directly output.

Zend_View::setScriptPath() in versions up to and including 1.7.4 include a potential Local File Inclusion vulnerability. If untrusted input is used to specify the script path and/or view script itself, a malicious attacker could potentially specify a system directory and thus render a system file.

As an example, if the user-supplied string /etc/passwd or a relative path that resolved to that file, was supplied to Zend_View::render(), that file would be rendered.

Affected configurations

Vulners
Node
zendframeworkzendframework1Range<1.7.5
CPENameOperatorVersion
zendframework/zendframework1lt1.7.5

7 High

AI Score

Confidence

Low