CVE-2014-2681
Severity CVSS v4.0:
Pending analysis
Type:
CWE-19
Data Handling
Publication date:
16/11/2014
Last modified:
12/04/2025
Description
Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0 allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, and possibly cause a denial of service (CPU and memory consumption) via an XML External Entity (XXE) attack. NOTE: this issue exists because of an incomplete fix for CVE-2012-5657.
Impact
Base Score 2.0
6.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:zend:zendrest:*:*:*:*:*:*:*:* | 2.0.1 (including) | |
| cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:* | 1.12.4 (excluding) | |
| cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:* | 2.1.0 (including) | 2.1.6 (excluding) |
| cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:* | 2.2.0 (including) | 2.2.6 (excluding) |
| cpe:2.3:a:zend:zendservice_slideshare:*:*:*:*:*:*:*:* | 2.0.1 (including) | |
| cpe:2.3:a:zend:zendservice_api:*:*:*:*:*:*:*:* | 1.0.0 (including) | |
| cpe:2.3:a:zend:zendservice_audioscrobbler:*:*:*:*:*:*:*:* | 2.0.1 (including) | |
| cpe:2.3:a:zend:zendservice_amazon:*:*:*:*:*:*:*:* | 2.0.2 (including) | |
| cpe:2.3:a:zend:zendservice_technorati:*:*:*:*:*:*:*:* | 2.0.1 (including) | |
| cpe:2.3:a:zend:zendservice_windowsazure:*:*:*:*:*:*:*:* | 2.0.1 (including) | |
| cpe:2.3:a:zend:zendopenid:*:*:*:*:*:*:*:* | 2.0.1 (including) | |
| cpe:2.3:a:zend:zendservice_nirvanix:*:*:*:*:*:*:*:* | 2.0.1 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2014-0151.html
- http://framework.zend.com/security/advisory/ZF2014-01
- http://seclists.org/oss-sec/2014/q2/0
- http://www.debian.org/security/2015/dsa-3265
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A072
- http://www.securityfocus.com/bid/66358
- http://advisories.mageia.org/MGASA-2014-0151.html
- http://framework.zend.com/security/advisory/ZF2014-01
- http://seclists.org/oss-sec/2014/q2/0
- http://www.debian.org/security/2015/dsa-3265
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A072
- http://www.securityfocus.com/bid/66358



