Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2014-2683

CVE information

Published

8 years ago

Last Modified

3 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0 allow remote attackers to cause a denial of service (CPU consumption) via (1) recursive or (2) circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack. NOTE: this issue exists because of an incomplete fix for CVE-2012-6532..

CVSSv2.0 Score

Severity
Medium
Base Score
5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:zend:zendrest:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*
  Yes
- 1.12.4
cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*
  Yes
2.1.0 2.1.6
cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*
  Yes
2.2.0 2.2.6
cpe:2.3:a:zend:zendservice_slideshare:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:zend:zendservice_api:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:zend:zendservice_audioscrobbler:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:zend:zendservice_amazon:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:zend:zendservice_technorati:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:zend:zendservice_windowsazure:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:zend:zendopenid:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:zend:zendservice_nirvanix:*:*:*:*:*:*:*:*
  Yes
- -