Description
The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-302-1 | zendframework security update |
Debian DLA |
DLA-499-1 | php5 security update |
Debian DSA |
DSA-3340-1 | zendframework security update |
Github GHSA |
GHSA-xp8p-9rq5-4wgv | ZendXml and Zend Framework contain XXE and XEE Vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T06:41:07.867Z
Reserved: 2015-07-01T00:00:00.000Z
Link: CVE-2015-5161
No data.
Status : Modified
Published: 2015-08-25T17:59:03.307
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-5161
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Github GHSA