Description
Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xx8f-qf9f-5fgw | Remote code execution in zendframework and laminas-http |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T16:45:50.691Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-3007
No data.
Status : Modified
Published: 2021-01-04T03:15:13.527
Modified: 2024-11-21T06:20:44.207
Link: CVE-2021-3007
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA