UBUNTU-CVE-2012-6531

Source
https://ubuntu.com/security/CVE-2012-6531
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-6531.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2012-6531
Upstream
  • CVE-2012-6531
Published
2013-02-13T17:55:00Z
Modified
2025-10-24T04:44:58Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

(1) ZendDom, (2) ZendFeed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.

References

Affected packages

Ubuntu:16.04:LTS / zend-framework

Package

Name
zend-framework
Purl
pkg:deb/ubuntu/zend-framework@1.11.11-0ubuntu3.16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.11.11-0ubuntu2
1.11.11-0ubuntu3
1.11.11-0ubuntu3.16.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.11.11-0ubuntu3.16.04.1",
            "binary_name": "libzend-framework-php"
        },
        {
            "binary_version": "1.11.11-0ubuntu3.16.04.1",
            "binary_name": "libzend-framework-zendx-php"
        },
        {
            "binary_version": "1.11.11-0ubuntu3.16.04.1",
            "binary_name": "zend-framework"
        },
        {
            "binary_version": "1.11.11-0ubuntu3.16.04.1",
            "binary_name": "zend-framework-bin"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-6531.json"