CVE-2012-3363

Zend_XmlRpc in Zend Framework 1.x before 1.11.12 and 1.12.x before 1.12.0 does not properly handle SimpleXMLElement classes, which allows remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack.
References
Link Resource
http://framework.zend.com/security/advisory/ZF2012-01 Vendor Advisory
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-34284 Patch
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101310.html Mailing List
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101358.html Mailing List
http://openwall.com/lists/oss-security/2013/03/25/2 Mailing List
http://www.debian.org/security/2012/dsa-2505 Mailing List
http://www.openwall.com/lists/oss-security/2012/06/26/2 Mailing List
http://www.openwall.com/lists/oss-security/2012/06/26/4 Mailing List
http://www.openwall.com/lists/oss-security/2012/06/27/2 Mailing List
http://www.securitytracker.com/id?1027208 Broken Link Third Party Advisory VDB Entry
https://moodle.org/mod/forum/discuss.php?d=225345 Third Party Advisory
https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt Broken Link
http://framework.zend.com/security/advisory/ZF2012-01 Vendor Advisory
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-34284 Patch
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101310.html Mailing List
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101358.html Mailing List
http://openwall.com/lists/oss-security/2013/03/25/2 Mailing List
http://www.debian.org/security/2012/dsa-2505 Mailing List
http://www.openwall.com/lists/oss-security/2012/06/26/2 Mailing List
http://www.openwall.com/lists/oss-security/2012/06/26/4 Mailing List
http://www.openwall.com/lists/oss-security/2012/06/27/2 Mailing List
http://www.securitytracker.com/id?1027208 Broken Link Third Party Advisory VDB Entry
https://moodle.org/mod/forum/discuss.php?d=225345 Third Party Advisory
https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.12.0:rc2:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.12.0:rc3:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.12.0:rc4:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-02-13 17:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-3363

Mitre link : CVE-2012-3363

CVE.ORG link : CVE-2012-3363


JSON object : View

Products Affected

zend

  • zend_framework

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-611

Improper Restriction of XML External Entity Reference