-
CVSS Score
-The vulnerability stems from insecure XML processing using PHP's DOMDocument/simplexml_load_*/xml_parse functions without proper entity restrictions. The security advisory ZF2014-01 explicitly states these functions were patched across multiple components by introducing Zend_Xml_Security scanning. Vulnerable functions would be those XML processing entry points in affected components before they implemented the security scanning. High confidence comes from: 1) Explicit component listings in CVE description 2) Advisory's focus on XML processing functions 3) Known vulnerable patterns in Zend Framework's historical XML handling.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| zendframework/zendframework1 | composer | < 1.12.4 | 1.12.4 |
| zendframework/zendopenid | composer | < 2.0.2 | 2.0.2 |
| zendframework/zendrest | composer | < 2.0.2 | 2.0.2 |
| zendframework/zendservice-audioscrobbler | composer | < 2.0.2 | 2.0.2 |
| zendframework/zendservice-nirvanix | composer | < 2.0.2 | 2.0.2 |
| zendframework/zendservice-slideshare | composer | < 2.0.2 | 2.0.2 |
| zendframework/zendservice-technorati | composer | < 2.0.2 | 2.0.2 |
| zendframework/zendservice-windowsazure | composer | < 2.0.2 | 2.0.2 |
| zendframework/zendservice-amazon | composer | < 2.0.3 | 2.0.3 |
| zendframework/zendservice-api | composer | < 1.0.0 | 1.0.0 |
A Semantic Attack on Google Gemini - Read the Latest Research