Miggo Logo

CVE-2015-3154:
Zenario CMS vulnerable to CRLF injection

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.50562%
Published
5/24/2022
Updated
2/1/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
zendframework/zendframeworkcomposer>= 2.0.0beta4, < 2.3.82.3.8
zendframework/zendframeworkcomposer>= 2.4.0rc1, < 2.4.12.4.1
zendframework/zend-httpcomposer>= 2.0.0beta4, < 2.3.82.3.8
zendframework/zend-httpcomposer>= 2.4.0rc1, < 2.4.12.4.1
zendframework/zendframework1composer< 1.12.121.12.12
zendframework/zend-httpcomposer< 1.12.121.12.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper validation of CRLF sequences in header values. The advisory explicitly references Zend\Mail and Zend\Http components, with examples showing header injection via setSubject(). The patch introduced HeaderValue validation classes, indicating pre-patch header setters like setSubject() and addHeaderLine() were vulnerable. The ZF1 equivalent Zend_Mail methods would share the same flaw. These functions directly accepted user-controlled header values without sanitization, allowing attackers to inject malicious headers via CRLF sequences.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*RL* inj**tion vuln*r**ility in Z*n*\M*il (Z*n*_M*il) in Z*n* *r*m*work ***or* *.**.**, *.x ***or* *.*.*, *n* *.*.x ***or* *.*.* *llows r*mot* *tt**k*rs to inj**t *r*itr*ry *TTP *****rs *n* *on*u*t *TTP r*spons* splittin* *tt**ks vi* *RL* s*qu*n**s i

Reasoning

T** vuln*r**ility st*ms *rom improp*r `v*li**tion` o* *RL* s*qu*n**s in *****r v*lu*s. T** **visory *xpli*itly r***r*n**s `Z*n*\M*il` *n* `Z*n*\*ttp` *ompon*nts, wit* *x*mpl*s s*owin* *****r inj**tion vi* `s*tSu*j**t()`. T** p*t** intro*u*** `*****rV