Miggo Logo

CVE-2013-4701: PHP OpenID Library Denial of Service vulnerability

7.5

CVSS Score

Basic Information

EPSS Score
0.7439%
Published
5/17/2022
Updated
2/6/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
openid/php-openidcomposer< 2.3.02.3.0
typo3/cmscomposer>= 6.2.0, < 6.2.66.2.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the setXML method in Auth/Yadis/XML.php, which processed untrusted XML input without proper XXE protections. The GitHub patch explicitly adds libxml_disable_entity_loader(true) and error handling around the loadXML call, confirming this was the vulnerable code path. The TYPO3/CMS package is listed as vulnerable due to its dependency on php-openid, but the root vulnerable function resides in the openid library's XML parser implementation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ut*/Y**is/XML.p*p in P*P Op*nI* Li*r*ry *.*.* *n* **rli*r *llows r*mot* *tt**k*rs to r*** *r*itr*ry *il*s, s*n* *TTP r*qu*sts to intr*n*t s*rv*rs, or **us* * **ni*l o* s*rvi** (*PU *n* m*mory *onsumption) vi* XR*S **t* *ont*inin* *n *xt*rn*l *ntity

Reasoning

T** vuln*r**ility st*ms *rom t** s*tXML m*t*o* in *ut*/Y**is/XML.p*p, w*i** pro**ss** untrust** XML input wit*out prop*r XX* prot**tions. T** *it*u* p*t** *xpli*itly ***s li*xml_*is**l*_*ntity_lo***r(tru*) *n* *rror **n*lin* *roun* t** lo**XML **ll,