CVE-2012-6532 (GCVE-0-2012-6532)
Vulnerability from cvelistv5
Published
2013-02-13 17:00
Modified
2024-08-06 21:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
(1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, and (4) Zend_XmlRpc in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 allow remote attackers to cause a denial of service (CPU consumption) via recursive or circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2013:115", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:115" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://framework.zend.com/security/advisory/ZF2012-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "(1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, and (4) Zend_XmlRpc in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 allow remote attackers to cause a denial of service (CPU consumption) via recursive or circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-04T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDVSA-2013:115", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:115" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://framework.zend.com/security/advisory/ZF2012-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6532", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "(1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, and (4) Zend_XmlRpc in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 allow remote attackers to cause a denial of service (CPU consumption) via recursive or circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2013:115", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:115" }, { "name": "http://framework.zend.com/security/advisory/ZF2012-02", "refsource": "CONFIRM", "url": "http://framework.zend.com/security/advisory/ZF2012-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6532", "datePublished": "2013-02-13T17:00:00", "dateReserved": "2013-02-13T00:00:00", "dateUpdated": "2024-08-06T21:28:39.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-6532\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-02-13T17:55:01.523\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"(1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, and (4) Zend_XmlRpc in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 allow remote attackers to cause a denial of service (CPU consumption) via recursive or circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack.\"},{\"lang\":\"es\",\"value\":\"(1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, y (4) Zend_XmlRpc en Zend Framework v1.x antes de v1.11.13 y antes v1.12.0 1.12.x de permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU ) a trav\u00e9s de referencias recursivas o circular en una definici\u00f3n XML de entidad en una declaraci\u00f3n XML DOCTYPE, tambi\u00e9n conocido como una entidad de expansi\u00f3n XML (XEE) ataque.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1417EB1F-5342-443B-AC81-3256FCCE1BFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECA9145E-8B8C-4822-A1FC-A891DF92FD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BD97A6-336A-4B8A-AFC5-C9EA1DDCCC8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B636257-9941-4997-9525-F8C5A920AB8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"118C20B5-FC8D-4EBF-A7D7-975A568A31BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CEB67E5-D7D9-443A-9176-3104A9C068AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F965C4F5-5F12-42CF-B120-758205E0E050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"531B7A51-2B4C-4A50-A8C8-D81040FF6E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D75279-B5A8-4C82-B2C0-C58DEF56A086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D97342-CF37-486E-A3C9-FBA000F5A041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"819E0C25-1413-4532-9427-24520E23C07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A96DF1-81D9-4BD3-9E62-CEECE377406D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF957F4D-FDFD-419B-AD2B-02E572A3BA9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"000BAA0C-6546-4DEC-8B85-146508C19F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429128C9-689E-49EA-BD8C-138FC337AB08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2096048C-7E4A-415E-AEBF-9AB7E8BCE894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B72E45D-E298-45BD-9EE5-127D3EFEC17C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07D06D35-CE63-456D-A970-5AE663175E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11459424-1BA2-44D0-B831-92BE6E2664E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A847F7F6-18EF-44FB-9153-BD7D3223D6ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE53880-D68C-49CB-BFE7-D1806AAD5C6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B7421E-E0C4-4594-AE81-4F3811CAAB33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EABF4FA-D4A6-4C82-BF9C-A828B906F499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F10191E-9EF7-47B8-9CDC-FCFE47AEFE50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3E24C3-21CC-4ED2-8669-5D94BD5D99AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B01DA0-E43B-456F-98CB-B806E3A54E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD3BA6AE-8D0D-48C4-82C2-90164113232A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C405425-36E0-458C-9EB8-760703DF39DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC94846-2345-4A62-8E57-AC7EAFCD05D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8074B0AD-C349-4BAC-9076-DD08893F5574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18F43C9F-1EE9-4B77-AD35-EB1286BED2EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"557E4E4E-0022-4EEA-A08D-BFE2392147EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC4C9BC-B0FC-4050-B998-5DB523C26EE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C844B367-8CE3-4347-B822-FA74D29E87C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78EAC4C3-D9D3-4F3C-A56E-C434F15860CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6322EB6C-3CAD-4E61-AC47-FDB416F9BAEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A341606-0AD5-442B-BEF3-D8246402CE00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F033605-4770-453C-9C8D-48AB36B93F23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CF3E847-EF03-4B57-B54F-01E2D4DA2261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E7A156-6F31-48D6-B1A7-991CDC120602\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC72907-188E-4B2B-AA08-482A98227961\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB1E9C46-CF7B-4142-A178-C21EB3E4C844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A033B19-5C9B-4948-88C6-9B8E69135112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81773611-D93F-4A8A-AE36-BEE60385F39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AAF5871-E892-4EDE-8845-E3633E10F733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99D5C2A0-11C8-458A-910F-58E7F39243C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE49C5F9-1C3D-44FD-831D-663013EDFA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B338FCC6-506F-468D-9551-B7FA22D31BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687ABF79-8F2F-4E5F-BF2A-42AD4F60C178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E96CB5-E6F8-4163-8A95-B72C243FF133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F486B0E-45D9-4B15-B4B7-1C35C3B9A8C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A751B994-80CF-475C-AFCC-C3645A4B2BF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F25F13A3-867D-4D79-8B7B-9771D3DB0540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64C08E10-14D4-4ACE-9064-8322A09773C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA4B247-94D3-400C-A575-3DBA755C24E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A78C7EE7-7C12-45D2-913E-DC4902886C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F3ED10-8D1F-4D01-A79B-95AAF864B0BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E65648D-78FF-47D8-9F9E-66E9A8C121AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA6467DF-3983-4BB9-ACC7-C6AFE753E319\"}]}]}],\"references\":[{\"url\":\"http://framework.zend.com/security/advisory/ZF2012-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:115\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://framework.zend.com/security/advisory/ZF2012-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…