CVE-2014-2685 (GCVE-0-2014-2685)
Vulnerability from cvelistv5
Published
2014-09-04 17:00
Modified
2024-08-06 10:21
Severity ?
CWE
  • n/a
Summary
The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 violate the OpenID 2.0 protocol by ensuring only that at least one field is signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:21:36.026Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20140331 CVE requests: Zend Framework issues fixed in ZF2014-01 and ZF2014-02",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2014/q2/0"
          },
          {
            "name": "MDVSA-2014:072",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:072"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0151.html"
          },
          {
            "name": "66358",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/66358"
          },
          {
            "name": "DSA-3265",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2015/dsa-3265"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://framework.zend.com/security/advisory/ZF2014-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 violate the OpenID 2.0 protocol by ensuring only that at least one field is signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20140331 CVE requests: Zend Framework issues fixed in ZF2014-01 and ZF2014-02",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2014/q2/0"
        },
        {
          "name": "MDVSA-2014:072",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:072"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0151.html"
        },
        {
          "name": "66358",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/66358"
        },
        {
          "name": "DSA-3265",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2015/dsa-3265"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://framework.zend.com/security/advisory/ZF2014-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-2685",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 violate the OpenID 2.0 protocol by ensuring only that at least one field is signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20140331 CVE requests: Zend Framework issues fixed in ZF2014-01 and ZF2014-02",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2014/q2/0"
            },
            {
              "name": "MDVSA-2014:072",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:072"
            },
            {
              "name": "http://advisories.mageia.org/MGASA-2014-0151.html",
              "refsource": "CONFIRM",
              "url": "http://advisories.mageia.org/MGASA-2014-0151.html"
            },
            {
              "name": "66358",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/66358"
            },
            {
              "name": "DSA-3265",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2015/dsa-3265"
            },
            {
              "name": "http://framework.zend.com/security/advisory/ZF2014-02",
              "refsource": "CONFIRM",
              "url": "http://framework.zend.com/security/advisory/ZF2014-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-2685",
    "datePublished": "2014-09-04T17:00:00",
    "dateReserved": "2014-03-30T00:00:00",
    "dateUpdated": "2024-08-06T10:21:36.026Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-2685\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-09-04T17:55:04.747\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 violate the OpenID 2.0 protocol by ensuring only that at least one field is signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.\"},{\"lang\":\"es\",\"value\":\"La clase GenericConsumer en el componente Consumer en ZendOpenId anterior a 2.0.2 y la clase Zend_OpenId_Consumer en Zend Framework 1 anterior a 1.12.4 violan el protocolo OpenID 2.0 al asegurar solamente que al menos un campo est\u00e9 firmado, lo que permite a atacantes remotos evadir la autenticaci\u00f3n mediante el aprovechamiento de una aserci\u00f3n de un proveedor OpenID.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.3\",\"matchCriteriaId\":\"269217EF-D4A3-4789-BC72-05F2CDFDDF68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C42B4F3-D79C-42DE-B86C-9E7612E71661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"536CC39B-D305-492F-892C-6431BD7BA95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"17673E8C-CB65-447E-8A6B-1083E6E77B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.0:rc2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA85105D-B9FB-4147-87B7-4F4DD0324AE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C549AF-2C59-4D8E-B651-EA630C3B2975\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50EF804C-102C-47F5-A85A-63EAA7EF9BAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B648466-36AD-4EC0-BDE1-C976F697D58F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9DCE27-D2D1-4329-88F5-911DA763469C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1417EB1F-5342-443B-AC81-3256FCCE1BFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECA9145E-8B8C-4822-A1FC-A891DF92FD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.0:pl:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE686B51-76FB-442F-94BE-60E95CFF67AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.0:pr:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F9BD7D0-C975-4E7E-BCD1-C7FB52B1D5E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE350CD6-54CA-4BDF-9327-60F872098D68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3603D2F-91FE-4B12-A5BC-2F63E1612A39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"04524F0F-6C21-4670-9B2C-A3B06C151799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BD97A6-336A-4B8A-AFC5-C9EA1DDCCC8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B636257-9941-4997-9525-F8C5A920AB8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"118C20B5-FC8D-4EBF-A7D7-975A568A31BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CEB67E5-D7D9-443A-9176-3104A9C068AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"20C61B54-2D08-45FD-A10A-34AD50EC3BED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FD68242-67DB-4C1D-8265-7839976DBCEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C32036E-14BC-48AE-92A4-9DDCC96EC557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F965C4F5-5F12-42CF-B120-758205E0E050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"531B7A51-2B4C-4A50-A8C8-D81040FF6E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D75279-B5A8-4C82-B2C0-C58DEF56A086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.0:pl1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE99D584-E652-4B9F-BD2E-45A167B1524C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.0:pr:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EE1CCE3-4AD0-4ABD-B4C9-5390F9CDB37F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D97342-CF37-486E-A3C9-FBA000F5A041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"819E0C25-1413-4532-9427-24520E23C07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A96DF1-81D9-4BD3-9E62-CEECE377406D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.3:pl1:*:*:*:*:*:*\",\"matchCriteriaId\":\"744FEDE8-5825-4C5C-887D-9ADCC9183AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF957F4D-FDFD-419B-AD2B-02E572A3BA9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"000BAA0C-6546-4DEC-8B85-146508C19F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429128C9-689E-49EA-BD8C-138FC337AB08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2096048C-7E4A-415E-AEBF-9AB7E8BCE894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B72E45D-E298-45BD-9EE5-127D3EFEC17C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07D06D35-CE63-456D-A970-5AE663175E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11459424-1BA2-44D0-B831-92BE6E2664E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FACC0F56-C6CB-4BC7-946E-8077B2C90B2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB4F6AA5-8320-4451-9C8C-02D68FE4CA3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A847F7F6-18EF-44FB-9153-BD7D3223D6ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE53880-D68C-49CB-BFE7-D1806AAD5C6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B7421E-E0C4-4594-AE81-4F3811CAAB33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EABF4FA-D4A6-4C82-BF9C-A828B906F499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.4:pl1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA1EBE6-0E18-44FA-BE72-D6512E7409B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F10191E-9EF7-47B8-9CDC-FCFE47AEFE50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3E24C3-21CC-4ED2-8669-5D94BD5D99AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"075019DE-CC38-4DFF-B869-5884A7AC9000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"81CC10E4-37A8-4BAD-AC6D-EAD3A7E70CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3E9C9A-E12F-43EC-9134-4EFF2BA6B4D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B01DA0-E43B-456F-98CB-B806E3A54E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD3BA6AE-8D0D-48C4-82C2-90164113232A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C405425-36E0-458C-9EB8-760703DF39DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.3:pl1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3911A0-F189-488A-9246-BA8B1CF9B8CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC94846-2345-4A62-8E57-AC7EAFCD05D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8074B0AD-C349-4BAC-9076-DD08893F5574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18F43C9F-1EE9-4B77-AD35-EB1286BED2EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"557E4E4E-0022-4EEA-A08D-BFE2392147EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC4C9BC-B0FC-4050-B998-5DB523C26EE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C844B367-8CE3-4347-B822-FA74D29E87C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AAF2D17-6E72-4E27-B94B-397DB9C3A682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF93FB2E-0F51-4EE0-9A29-91B2A2311FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"528D7214-C4EE-40D9-83CF-F9B81382F257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78EAC4C3-D9D3-4F3C-A56E-C434F15860CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6322EB6C-3CAD-4E61-AC47-FDB416F9BAEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A341606-0AD5-442B-BEF3-D8246402CE00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F033605-4770-453C-9C8D-48AB36B93F23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CF3E847-EF03-4B57-B54F-01E2D4DA2261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E7A156-6F31-48D6-B1A7-991CDC120602\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC72907-188E-4B2B-AA08-482A98227961\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB1E9C46-CF7B-4142-A178-C21EB3E4C844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0227AEB0-4C45-4744-8501-B20F7B4254D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A033B19-5C9B-4948-88C6-9B8E69135112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5B221F8-CF2D-4994-87D9-57375D0942DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8BCCB2A-7873-4027-AECE-024EF7A71E60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81773611-D93F-4A8A-AE36-BEE60385F39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AAF5871-E892-4EDE-8845-E3633E10F733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99D5C2A0-11C8-458A-910F-58E7F39243C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE49C5F9-1C3D-44FD-831D-663013EDFA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B338FCC6-506F-468D-9551-B7FA22D31BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687ABF79-8F2F-4E5F-BF2A-42AD4F60C178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E96CB5-E6F8-4163-8A95-B72C243FF133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F486B0E-45D9-4B15-B4B7-1C35C3B9A8C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A751B994-80CF-475C-AFCC-C3645A4B2BF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F25F13A3-867D-4D79-8B7B-9771D3DB0540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64C08E10-14D4-4ACE-9064-8322A09773C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA4B247-94D3-400C-A575-3DBA755C24E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D934F3F-997E-44B8-A4D2-CC07FEEB7271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DBCDD61-759D-4623-B7ED-88E78BDE7397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A78C7EE7-7C12-45D2-913E-DC4902886C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F3ED10-8D1F-4D01-A79B-95AAF864B0BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E65648D-78FF-47D8-9F9E-66E9A8C121AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA6467DF-3983-4BB9-ACC7-C6AFE753E319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93186E8D-5681-4350-A6B1-C020B3C47560\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A65D2D2-766B-4C47-B6B8-352184D4D15A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zendopenid:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.0.1\",\"matchCriteriaId\":\"255171B6-0A4C-4757-ADDA-28916398499C\"}]}]}],\"references\":[{\"url\":\"http://advisories.mageia.org/MGASA-2014-0151.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://framework.zend.com/security/advisory/ZF2014-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/oss-sec/2014/q2/0\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3265\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:072\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/66358\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://advisories.mageia.org/MGASA-2014-0151.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://framework.zend.com/security/advisory/ZF2014-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/oss-sec/2014/q2/0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3265\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:072\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/66358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…