Zend_XmlRpc in Zend Framework 1.x before 1.11.12 and 1.12.x before 1.12.0 does not properly handle SimpleXMLElement classes, which allows remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
https://moodle.org/mod/forum/discuss.php?d=225345 | third party advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101358.html | vendor advisory mailing list |
http://www.openwall.com/lists/oss-security/2012/06/27/2 | mailing list |
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-34284 | patch |
http://www.debian.org/security/2012/dsa-2505 | vendor advisory mailing list |
http://www.openwall.com/lists/oss-security/2012/06/26/4 | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101310.html | vendor advisory mailing list |
http://www.openwall.com/lists/oss-security/2012/06/26/2 | mailing list |
http://openwall.com/lists/oss-security/2013/03/25/2 | mailing list |
http://www.securitytracker.com/id?1027208 | broken link third party advisory vdb entry |
http://framework.zend.com/security/advisory/ZF2012-01 | vendor advisory |
https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt | broken link |