CVE-2012-6531

(1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zend:zend_framework:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.7.7:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.7.8:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.7.9:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.9.2:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.9.3:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.9.4:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.9.5:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.9.6:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.9.7:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.9.8:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.10.0:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.10.1:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.10.2:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.10.3:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.10.4:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.10.5:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.10.6:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.10.7:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.10.8:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.0:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.1:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.2:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.3:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.4:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.5:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.6:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.7:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.8:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.9:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.10:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.11:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.11.12:*:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.12.0:rc2:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.12.0:rc3:*:*:*:*:*:*
cpe:2.3:a:zend:zend_framework:1.12.0:rc4:*:*:*:*:*:*

History

No history.

Information

Published : 2013-02-13 17:55

Updated : 2023-12-10 11:16


NVD link : CVE-2012-6531

Mitre link : CVE-2012-6531

CVE.ORG link : CVE-2012-6531


JSON object : View

Products Affected

zend

  • zend_framework
CWE
CWE-20

Improper Input Validation