CVE-2012-3363

Scores

EPSS

0.551medium55.1%
0%20%40%60%80%100%

Percentile: 55.1%

CVSS

9.1critical3.x
0246810

CVSS Score: 9.1/10

All CVSS Scores

CVSS 3.x
9.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS 2.0
6.4

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Description

Zend_XmlRpc in Zend Framework 1.x before 1.11.12 and 1.12.x before 1.12.0 does not properly handle SimpleXMLElement classes, which allows remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-611

Exploits

Exploit ID: 19408

Source: exploitdb

URL: https://www.exploit-db.com/exploits/19408

Vulnerable Software (17)

Type: Configuration

Product: moodle

Operating System: debian

Trait:
{  "fixed": "2.5-1"}

Source: debian

Type: Configuration

Product: moodle

Operating System: debian squeeze 6

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: zend-framework

Operating System: ubuntu hardy 8.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: zend-framework

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: zend-framework

Operating System: ubuntu utopic 14.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: zend-framework

Operating System: ubuntu vivid 15.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: zend-framework

Operating System: ubuntu wily 15.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: zend-framework

Operating System: ubuntu xenial 16.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: zend-framework

Operating System: ubuntu yakkety 16.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: zendframework

Operating System: debian

Trait:
{  "fixed": "1.11.12-1"}

Source: debian

Type: Configuration

Product: zendframework

Operating System: ubuntu artful 17.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: zendframework

Operating System: ubuntu bionic 18.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: zendframework

Operating System: ubuntu cosmic 18.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: zendframework

Operating System: ubuntu zesty 17.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Vendor: *

Product: debian_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: fedora

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*",...

Source: nvd

Type: Configuration

Vendor: *

Product: zend_framework

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*",      "versionEndExcluding": "1.11.12",      "versionStartIncluding": "1.0.0",      "vulnerable": true   ...

Source: nvd

End of list