CVE Vulnerabilities

CVE-2012-3363

Improper Restriction of XML External Entity Reference

Published: Feb 13, 2013 | Modified: Apr 11, 2025
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Zend_XmlRpc in Zend Framework 1.x before 1.11.12 and 1.12.x before 1.12.0 does not properly handle SimpleXMLElement classes, which allows remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack.

Weakness

The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.

Affected Software

NameVendorStart VersionEnd Version
Zend_frameworkZend1.0.0 (including)1.11.12 (excluding)
Zend_frameworkZend1.12.0-rc1 (including)1.12.0-rc1 (including)
Zend_frameworkZend1.12.0-rc2 (including)1.12.0-rc2 (including)
Zend_frameworkZend1.12.0-rc3 (including)1.12.0-rc3 (including)
Zend_frameworkZend1.12.0-rc4 (including)1.12.0-rc4 (including)
Zend-frameworkUbuntuesm-apps/xenial*
Zend-frameworkUbuntuhardy*
Zend-frameworkUbuntulucid*
Zend-frameworkUbuntunatty*
Zend-frameworkUbuntuoneiric*
Zend-frameworkUbuntuprecise*
Zend-frameworkUbuntuquantal*
Zend-frameworkUbunturaring*
Zend-frameworkUbuntusaucy*
Zend-frameworkUbuntutrusty*
Zend-frameworkUbuntuupstream*
Zend-frameworkUbuntuutopic*
Zend-frameworkUbuntuvivid*
Zend-frameworkUbuntuwily*
Zend-frameworkUbuntuxenial*
Zend-frameworkUbuntuyakkety*
ZendframeworkUbuntulucid*
ZendframeworkUbuntuupstream*

Potential Mitigations

References