Vulnerability Name:

CVE-2014-2681 (CCN-99941)

Assigned:2014-03-21
Published:2014-03-21
Updated:2019-07-16
Summary:Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0 allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, and possibly cause a denial of service (CPU and memory consumption) via an XML External Entity (XXE) attack.
Note: this issue exists because of an incomplete fix for CVE-2012-5657.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P)
4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-19
Vulnerability Consequences:Denial of Service
References:Source: CONFIRM
Type: Third Party Advisory
http://advisories.mageia.org/MGASA-2014-0151.html

Source: MITRE
Type: CNA
CVE-2014-2681

Source: CCN
Type: ZF2014-01
Potential XXE/XEE attacks using PHP functions: simplexml_load_*, DOMDocument::loadXML, and xml_parse

Source: CONFIRM
Type: Vendor Advisory
http://framework.zend.com/security/advisory/ZF2014-01

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20140331 Re: CVE requests: Zend Framework issues fixed in ZF2014-01 and ZF2014-02

Source: DEBIAN
Type: Third Party Advisory
DSA-3265

Source: MANDRIVA
Type: Third Party Advisory
MDVSA-2014:072

Source: BID
Type: Third Party Advisory, VDB Entry
66358

Source: CCN
Type: BID-66358
Zend Framework Multiple Information Disclosure and Security Bypass Vulnerabilities

Source: XF
Type: UNKNOWN
zend-framework-cve20142681-dos(99941)

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2014-2681

Vulnerable Configuration:Configuration 1:
  • cpe:/a:zend:zendrest:*:*:*:*:*:*:*:* (Version <= 2.0.1)

  • Configuration 2:
  • cpe:/a:zend:zend_framework:*:*:*:*:*:*:*:* (Version < 1.12.4)
  • OR cpe:/a:zend:zend_framework:*:*:*:*:*:*:*:* (Version >= 2.1.0 and < 2.1.6)
  • OR cpe:/a:zend:zend_framework:*:*:*:*:*:*:*:* (Version >= 2.2.0 and < 2.2.6)

  • Configuration 3:
  • cpe:/a:zend:zendservice_slideshare:*:*:*:*:*:*:*:* (Version <= 2.0.1)

  • Configuration 4:
  • cpe:/a:zend:zendservice_api:*:*:*:*:*:*:*:* (Version <= 1.0.0)

  • Configuration 5:
  • cpe:/a:zend:zendservice_audioscrobbler:*:*:*:*:*:*:*:* (Version <= 2.0.1)

  • Configuration 6:
  • cpe:/a:zend:zendservice_amazon:*:*:*:*:*:*:*:* (Version <= 2.0.2)

  • Configuration 7:
  • cpe:/a:zend:zendservice_technorati:*:*:*:*:*:*:*:* (Version <= 2.0.1)

  • Configuration 8:
  • cpe:/a:zend:zendservice_windowsazure:*:*:*:*:*:*:*:* (Version <= 2.0.1)

  • Configuration 9:
  • cpe:/a:zend:zendopenid:*:*:*:*:*:*:*:* (Version <= 2.0.1)

  • Configuration 10:
  • cpe:/a:zend:zendservice_nirvanix:*:*:*:*:*:*:*:* (Version <= 2.0.1)

  • Configuration CCN 1:
  • cpe:/a:zend:zend_framework:1.12.3:*:*:*:*:*:*:*
  • OR cpe:/a:zend:zend_framework:2.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:zend:zendopenid:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:zend:zendservice_audioscrobbler:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:zend:zendservice_windowsazure:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:zend:zend_framework:2.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:zend:zendservice_api:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:zend:zendservice_technorati:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:zend:zendservice_amazon:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:zend:zendservice_slideshare:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:zend:zendrest:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:zend:zendservice_nirvanix:2.0.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.cisecurity:def:69
    P
    DSA-3265-1 -- zendframework -- security update
    2016-02-08
    BACK
    zend zendrest *
    zend zend framework *
    zend zend framework *
    zend zend framework *
    zend zendservice slideshare *
    zend zendservice api *
    zend zendservice audioscrobbler *
    zend zendservice amazon *
    zend zendservice technorati *
    zend zendservice windowsazure *
    zend zendopenid *
    zend zendservice nirvanix *
    zend zend framework 1.12.3
    zend zend framework 2.1.5
    zend zendopenid 2.0.1
    zend zendservice audioscrobbler 2.0.1
    zend zendservice windowsazure 2.0.1
    zend zend framework 2.2.5
    zend zendservice api 1.0.0
    zend zendservice technorati 2.0.1
    zend zendservice amazon 2.0.2
    zend zendservice slideshare 2.0.1
    zend zendrest 2.0.1
    zend zendservice nirvanix 2.0.1