GHSA-qg7m-mwxm-j3h7: Zend-developer-tools information disclosure vulnerability
5.3
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
6/7/2024
Updated
6/7/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| zendframework/zend-developer-tools | composer | >= 1.2.2, < 1.2.3 | 1.2.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper processing of toolbar configuration entries. The key change in the patch replaces 'break' with 'continue' in the loop that processes toolbar entries. The original 'break' statement caused the loop to exit after handling the first disabled entry, potentially leaving other default-enabled entries unprocessed and enabled. This matches the described vulnerability where default-enabled entries couldn't be properly disabled. The test case added in OptionsTest.php explicitly verifies this behavior, confirming the function's role in the vulnerability.