Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5161

Опубликовано: 25 авг. 2015
Источник: debian
EPSS Средний

Описание

The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zendframeworkfixed1.12.14+dfsg-1package
php-zend-xmlfixed1.0.1-1package

Примечания

  • http://framework.zend.com/security/advisory/ZF2015-06

  • Root issue already fixed in PHP 5.6.6, so this one is not relevant starting with Jessie

EPSS

Процентиль: 97%
0.40825
Средний

Связанные уязвимости

ubuntu
больше 10 лет назад

The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters.

nvd
больше 10 лет назад

The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters.

github
больше 3 лет назад

ZendXml and Zend Framework contain XXE and XEE Vulnerabilities

suse-cvrf
больше 9 лет назад

Security update for php53

EPSS

Процентиль: 97%
0.40825
Средний