GHSA-5gmf-3c43-q73v

Suggest an improvement
Source
https://github.com/advisories/GHSA-5gmf-3c43-q73v
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-5gmf-3c43-q73v/GHSA-5gmf-3c43-q73v.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5gmf-3c43-q73v
Published
2024-06-07T20:50:55Z
Modified
2024-12-04T05:34:54.323554Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
ZendFramework vulnerable to Cross-site Scripting
Details

Zend\Debug, Zend\Feed\PubSubHubbub, Zend\Log\Formatter\Xml, Zend\Tag\Cloud\Decorator, Zend\Uri, Zend\View\Helper\HeadStyle, Zend\View\Helper\Navigation\Sitemap, and Zend\View\Helper\Placeholder\Container\AbstractStandalone were not using Zend\Escaper when escaping HTML, HTML attributes, and/or URLs. While most were performing some escaping, because they were not using context-appropriate escaping mechanisms, they could potentially be exploited to perform Cross Site Scripting (XSS) attacks.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-06-07T20:50:55Z"
}
References

Affected packages

Packagist / zendframework/zendframework

Package

Name
zendframework/zendframework
Purl
pkg:composer/zendframework/zendframework

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.0.0
Fixed
2.0.1

Affected versions

2.*

2.0.0