CVE-2014-2685
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
04/09/2014
Last modified:
12/04/2025
Description
The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 violate the OpenID 2.0 protocol by ensuring only that at least one field is signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:* | 1.12.3 (including) | |
| cpe:2.3:a:zend:zend_framework:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.0.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.0.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.0.0:rc2a:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.0.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.5.0:pl:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.5.0:pr:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.5.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:zend:zend_framework:1.5.0:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2014-0151.html
- http://framework.zend.com/security/advisory/ZF2014-02
- http://seclists.org/oss-sec/2014/q2/0
- http://www.debian.org/security/2015/dsa-3265
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A072
- http://www.securityfocus.com/bid/66358
- http://advisories.mageia.org/MGASA-2014-0151.html
- http://framework.zend.com/security/advisory/ZF2014-02
- http://seclists.org/oss-sec/2014/q2/0
- http://www.debian.org/security/2015/dsa-3265
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A072
- http://www.securityfocus.com/bid/66358



