CVE-2012-3363
Published Feb 13, 2013
Last updated 9 months ago
Overview
- Description
- Zend_XmlRpc in Zend Framework 1.x before 1.11.12 and 1.12.x before 1.12.0 does not properly handle SimpleXMLElement classes, which allows remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-611
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68B94C54-4E8F-4D13-9D0A-3E912D3E4545", "versionEndExcluding": "1.11.12", "versionStartIncluding": "1.0.0" }, { "criteria": "cpe:2.3:a:zend:zend_framework:1.12.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A78C7EE7-7C12-45D2-913E-DC4902886C11" }, { "criteria": "cpe:2.3:a:zend:zend_framework:1.12.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97F3ED10-8D1F-4D01-A79B-95AAF864B0BA" }, { "criteria": "cpe:2.3:a:zend:zend_framework:1.12.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E65648D-78FF-47D8-9F9E-66E9A8C121AB" }, { "criteria": "cpe:2.3:a:zend:zend_framework:1.12.0:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA6467DF-3983-4BB9-ACC7-C6AFE753E319" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DA9D861-3EAF-42F5-B0B6-A4CD7BDD6188" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E14271AE-1309-48F3-B9C6-D7DEEC488279" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244" } ], "operator": "OR" } ] } ]