CVE-2015-5161: ZendXml and Zend Framework contain XXE and XEE Vulnerabilities
6.8
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.96726%
CWE
Published
5/17/2022
Updated
2/7/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
AV:N/AC:M/Au:N/C:P/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
zendframework/zendframework | composer | >= 2.0.0, < 2.4.6 | 2.4.6 |
zendframework/zendframework | composer | >= 2.5.0, < 2.5.2 | 2.5.2 |
zendframework/zendframework1 | composer | >= 1.12.0, < 1.12.14 | 1.12.14 |
zendframework/zendxml | composer | >= 1.0.0, < 1.0.1 | 1.0.1 |
zendframework/zendframework | composer | >= 1.12.0, < 1.12.14 | 1.12.14 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two key issues: 1) heuristicScan's naive string matching for entity declarations that couldn't detect multibyte-encoded payloads, and 2) scan's decision to use heuristicScan instead of libxml_disable_entity_loader under PHP-FPM. The commit diffs show these functions were modified in patches, and the vulnerability documentation explicitly identifies Zend_Xml_Security::scan as the entry point. The combination of improper encoding handling in heuristicScan and the threading-related workaround in scan created the exploit vector.