PT-2012-59: XML External Entity Injection in Zend Framework

Vulnerable software

Zend Framework
Version: 1.12.0; 1.1.13 and earlier

Application link: 
http://framework.zend.com/

Severity level

Severity level: Medium 
Impact: XML External Entity Injection (XXE)
Access Vector: Remote

CVSS v2: 
Base Score: 6.4 
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:P)

CVE: not assigned

Software description

Zend Framework is a object-oriented library of components used to develop web application on PHP.

Vulnerability description

The specialists of the Positive Research center have detected a XXE Injection vulnerability in Zend Framework.
XXE Injection is possible during import of RSS documents in Zend Framework. An attacker is able to read an arbitrary file on the target system.

How to fix

Update your software up to the latest version.

Advisory status

13.12.2012 - Vendor is notified
13.12.2012 - Vendor gets vulnerability details
17.12.2012 - Vendor releases fixed version and details
05.02.2013 - Public disclosure

Credits

The vulnerability has discovered by Yury Dyachenko, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2012-59
http://framework.zend.com/security/advisory/ZF2012-05

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/