CVE-2021-3007: Backport of ZendHttpResponse_Stream, added certain type checking as a way to prevent exploitation. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3007
This vulnerability is caused by the unsecured deserialization of an object. In versions higher than Zend Framework 3.0.0, the attacker abuses the Zend3 feature that loads classes from objects in order to upload and execute malicious code in the server. The code can be uploaded using the “callback” parameter, which in this case inserts a malicious code instead of the “callbackOptions” array.
Has the problem been patched? What versions should users upgrade to? v20.0.9 v19.4.13
{ "nvd_published_at": "2021-04-21T21:15:00Z", "github_reviewed_at": "2021-04-21T20:16:53Z", "severity": "CRITICAL", "github_reviewed": true, "cwe_ids": [ "CWE-502" ] }