GHSA-4v57-pwvf-x35j: Zendframework potential Cross-site Scripting vector in `Zend_Service_ReCaptcha_MailHide`
6.1
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
6/7/2024
Updated
6/7/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
zendframework/zendframework1 | composer | >= 1.7.0, < 1.7.9 | 1.7.9 |
zendframework/zendframework1 | composer | >= 1.8.0, < 1.8.5 | 1.8.5 |
zendframework/zendframework1 | composer | >= 1.9.0, < 1.9.7 | 1.9.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) Missing email validation and 2) Improper use of htmlentities() without encoding specification. The advisory specifically calls out htmlentities() usage as problematic. In PHP, htmlentities() defaults to ISO-8859-1 encoding unless specified, making it vulnerable to multibyte XSS when processing UTF-8 input. The _getHtml method would be responsible for generating the CAPTCHA HTML output and would contain the vulnerable htmlentities() calls on email address parts without proper encoding arguments. The high confidence comes from the direct match between the advisory description and the typical implementation pattern in Zend_Service_ReCaptcha_MailHide components.