(1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2012/06/27/2 | mailing list |
http://www.debian.org/security/2012/dsa-2505 | vendor advisory |
http://www.openwall.com/lists/oss-security/2012/06/26/4 | mailing list |
http://www.openwall.com/lists/oss-security/2012/06/26/2 | mailing list |
http://framework.zend.com/security/advisory/ZF2012-01 | vendor advisory |
https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt |