GHSA-f6p5-76fp-m248: URL Rewrite vulnerability in multiple zendframework components
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
4/28/2022
Updated
1/7/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
zendframework/zend-diactoros | composer | < 1.8.4 | 1.8.4 |
zendframework/zend-feed | composer | < 2.10.3 | 2.10.3 |
zendframework/zend-http | composer | < 2.8.1 | 2.8.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability pattern across all components involves URI determination logic that trusted specific HTTP headers (X-Rewrite-Url, X-Original-Url) without verifying the server environment actually uses those rewrite mechanisms. The primary vulnerable functions are those responsible for marshaling request URIs in each component:
- In zend-diactoros: ServerRequestFactory's URI creation method trusted rewrite headers
- In zend-http: PhpEnvironment\Request's URI detection used vulnerable headers
- In zend-feed: PubSubHubbub's Subscriber used headers to verify callback URLs
These functions would appear in runtime profiles when processing malicious requests containing spoofed rewrite headers, as they directly handle header-based URI resolution before the security patches added server environment validation checks.