Vulnerability Name: CVE-2014-2681 (CCN-99941) Assigned: 2014-03-21 Published: 2014-03-21 Updated: 2019-07-16 Summary: Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0 allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, and possibly cause a denial of service (CPU and memory consumption) via an XML External Entity (XXE) attack. Note : this issue exists because of an incomplete fix for CVE-2012-5657 . CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P )4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-19 Vulnerability Consequences: Denial of Service References: Source: CONFIRM Type: Third Party Advisoryhttp://advisories.mageia.org/MGASA-2014-0151.html Source: MITRE Type: CNACVE-2014-2681 Source: CCN Type: ZF2014-01Potential XXE/XEE attacks using PHP functions: simplexml_load_*, DOMDocument::loadXML, and xml_parse Source: CONFIRM Type: Vendor Advisoryhttp://framework.zend.com/security/advisory/ZF2014-01 Source: MLIST Type: Mailing List, Third Party Advisory[oss-security] 20140331 Re: CVE requests: Zend Framework issues fixed in ZF2014-01 and ZF2014-02 Source: DEBIAN Type: Third Party AdvisoryDSA-3265 Source: MANDRIVA Type: Third Party AdvisoryMDVSA-2014:072 Source: BID Type: Third Party Advisory, VDB Entry66358 Source: CCN Type: BID-66358Zend Framework Multiple Information Disclosure and Security Bypass Vulnerabilities Source: XF Type: UNKNOWNzend-framework-cve20142681-dos(99941) Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2014-2681 Vulnerable Configuration: Configuration 1 :cpe:/a:zend:zendrest:*:*:*:*:*:*:*:* (Version <= 2.0.1)Configuration 2 :cpe:/a:zend:zend_framework:*:*:*:*:*:*:*:* (Version < 1.12.4)OR cpe:/a:zend:zend_framework:*:*:*:*:*:*:*:* (Version >= 2.1.0 and < 2.1.6) OR cpe:/a:zend:zend_framework:*:*:*:*:*:*:*:* (Version >= 2.2.0 and < 2.2.6) Configuration 3 :cpe:/a:zend:zendservice_slideshare:*:*:*:*:*:*:*:* (Version <= 2.0.1)Configuration 4 :cpe:/a:zend:zendservice_api:*:*:*:*:*:*:*:* (Version <= 1.0.0)Configuration 5 :cpe:/a:zend:zendservice_audioscrobbler:*:*:*:*:*:*:*:* (Version <= 2.0.1)Configuration 6 :cpe:/a:zend:zendservice_amazon:*:*:*:*:*:*:*:* (Version <= 2.0.2)Configuration 7 :cpe:/a:zend:zendservice_technorati:*:*:*:*:*:*:*:* (Version <= 2.0.1)Configuration 8 :cpe:/a:zend:zendservice_windowsazure:*:*:*:*:*:*:*:* (Version <= 2.0.1)Configuration 9 :cpe:/a:zend:zendopenid:*:*:*:*:*:*:*:* (Version <= 2.0.1)Configuration 10 :cpe:/a:zend:zendservice_nirvanix:*:*:*:*:*:*:*:* (Version <= 2.0.1)Configuration CCN 1 :cpe:/a:zend:zend_framework:1.12.3:*:*:*:*:*:*:* OR cpe:/a:zend:zend_framework:2.1.5:*:*:*:*:*:*:* OR cpe:/a:zend:zendopenid:2.0.1:*:*:*:*:*:*:* OR cpe:/a:zend:zendservice_audioscrobbler:2.0.1:*:*:*:*:*:*:* OR cpe:/a:zend:zendservice_windowsazure:2.0.1:*:*:*:*:*:*:* OR cpe:/a:zend:zend_framework:2.2.5:*:*:*:*:*:*:* OR cpe:/a:zend:zendservice_api:1.0.0:*:*:*:*:*:*:* OR cpe:/a:zend:zendservice_technorati:2.0.1:*:*:*:*:*:*:* OR cpe:/a:zend:zendservice_amazon:2.0.2:*:*:*:*:*:*:* OR cpe:/a:zend:zendservice_slideshare:2.0.1:*:*:*:*:*:*:* OR cpe:/a:zend:zendrest:2.0.1:*:*:*:*:*:*:* OR cpe:/a:zend:zendservice_nirvanix:2.0.1:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
zend zendrest *
zend zend framework *
zend zend framework *
zend zend framework *
zend zendservice slideshare *
zend zendservice api *
zend zendservice audioscrobbler *
zend zendservice amazon *
zend zendservice technorati *
zend zendservice windowsazure *
zend zendopenid *
zend zendservice nirvanix *
zend zend framework 1.12.3
zend zend framework 2.1.5
zend zendopenid 2.0.1
zend zendservice audioscrobbler 2.0.1
zend zendservice windowsazure 2.0.1
zend zend framework 2.2.5
zend zendservice api 1.0.0
zend zendservice technorati 2.0.1
zend zendservice amazon 2.0.2
zend zendservice slideshare 2.0.1
zend zendrest 2.0.1
zend zendservice nirvanix 2.0.1