Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xx8f-qf9f-5fgw

Опубликовано: 08 июн. 2021
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Remote code execution in zendframework and laminas-http

Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized.

Пакеты

Наименование

zendframework/zendframework

composer
Затронутые версииВерсия исправления

<= 3.0.0

Отсутствует

Наименование

laminas/laminas-http

composer
Затронутые версииВерсия исправления

< 2.14.2

2.14.2

EPSS

Процентиль: 99%
0.79527
Высокий

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
больше 4 лет назад

Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized

EPSS

Процентиль: 99%
0.79527
Высокий

9.8 Critical

CVSS3

Дефекты

CWE-502