Miggo Logo

CVE-2015-5723:
Doctrine Security Misconfiguration Vulnerability

7.8

CVSS Score

Basic Information

EPSS Score
-
CWE
-
Published
5/17/2022
Updated
2/5/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
doctrine/annotationscomposer< 1.2.71.2.7
doctrine/cachecomposer>= 1.4.0, < 1.4.21.4.2
doctrine/commoncomposer< 2.4.32.4.3
doctrine/commoncomposer>= 2.5.0-stable, < 2.5.12.5.1
doctrine/ormcomposer>= 2.5.0, < 2.5.12.5.1
doctrine/mongodb-odmcomposer< 1.0.21.0.2
doctrine/mongodb-odm-bundlecomposer< 3.0.13.0.1
zendframework/zendframework1composer>= 1.12.0, < 1.12.161.12.16
zendframework/zend-cachecomposer>= 2.5.0, < 2.5.32.5.3
aws/aws-sdk-phpcomposer>= 3.0.0, < 3.2.13.2.1
doctrine/cachecomposer>= 1.0.0, < 1.3.21.3.2
zendframework/zend-cachecomposer>= 2.4.0, < 2.4.82.4.8
zendframework/zendframeworkcomposer>= 2.4.0, < 2.4.82.4.8
zfcampus/zf-apigility-doctrinecomposer>= 1.0.0, < 1.0.31.0.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from directory creation with 0777 permissions when umask=0. Key functions were identified through:

  1. Doctrine's advisory explicitly mentioning cache directory permission fixes
  2. Zend Framework's security notice about Filesystem adapter changes
  3. Common patterns of cache initialization in ORM/ODM components
  4. File operations using PHP's mkdir() with insecure defaults These functions appear in stack traces when creating cache directories/files during normal operation, which would be exploited through permission-based code injection.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*o*trin* *nnot*tions ***or* *.*.*, ***** ***or* *.*.* *n* *.*.x ***or* *.*.*, *ommon ***or* *.*.* *n* *.*.x ***or* *.*.*, ORM ***or* *.*.* or *.*.x ***or* *.*.*, Mon*o** O*M ***or* *.*.*, *n* Mon*o** O*M *un*l* ***or* *.*.* us* worl*-writ**l* p*rmiss

Reasoning

T** vuln*r**ility st*ms *rom *ir**tory *r**tion wit* **** p*rmissions w**n um*sk=*. K*y *un*tions w*r* i**nti*i** t*rou**: *. *o*trin*'s **visory *xpli*itly m*ntionin* ***** *ir**tory p*rmission *ix*s *. Z*n* *r*m*work's s**urity noti** **out *il*sys