CVE-2012-4451
Multiple cross-site scripting (XSS) vulnerabilities in Zend Framework 2.0.x before 2.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified input to (1) Debug, (2) Feed\PubSubHubbub, (3) Log\Formatter\Xml, (4) Tag\Cloud\Decorator, (5) Uri, (6) View\Helper\HeadStyle, (7) View\Helper\Navigation\Sitemap, or (8) View\Helper\Placeholder\Container\AbstractStandalone, related to Escaper.
Published
2020-01-03T17:15:11.053
Last Modified
2024-11-21T01:42:55.480
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 6.1 (MEDIUM)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:N/I:P/A:N
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: PARTIAL
- Availability Impact: NONE
Exploitability Score
8.6
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
http://framework.zend.com/security/advisory/ZF2012-03
Vendor Advisory
([email protected])
-
http://seclists.org/oss-sec/2012/q3/571
Mailing List, Patch, Third Party Advisory
([email protected])
-
http://seclists.org/oss-sec/2012/q3/573
Mailing List, Patch, Third Party Advisory
([email protected])
-
http://www.securityfocus.com/bid/55636
Third Party Advisory, VDB Entry
([email protected])
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688946#10
Mailing List, Third Party Advisory
([email protected])
-
https://bugs.gentoo.org/show_bug.cgi?id=436210
Third Party Advisory
([email protected])
-
https://bugzilla.redhat.com/show_bug.cgi?id=860738
Issue Tracking, Patch, Third Party Advisory
([email protected])
-
https://github.com/zendframework/zf2/commit/27131ca9520bdf1d4c774c71459eba32f2b10733
Patch, Third Party Advisory
([email protected])
-
http://framework.zend.com/security/advisory/ZF2012-03
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://seclists.org/oss-sec/2012/q3/571
Mailing List, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://seclists.org/oss-sec/2012/q3/573
Mailing List, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/55636
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688946#10
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugs.gentoo.org/show_bug.cgi?id=436210
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugzilla.redhat.com/show_bug.cgi?id=860738
Issue Tracking, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/zendframework/zf2/commit/27131ca9520bdf1d4c774c71459eba32f2b10733
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)