Vulnerability Details : CVE-2015-5161
Public exploit exists!
The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters.
Vulnerability category: XML external entity (XXE) injection
Products affected by CVE-2015-5161
- cpe:2.3:a:zend:zend_framework:1.0.0:rc2a:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.6.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.8.4:pl1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.3:pl1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.0:pr:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.0:pl1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.9:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.10:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.7:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.11:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.0:b1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.7:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.8:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.5.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.6.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.3:pl1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.8.0:a1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.8.0:b1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.0:a1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.8:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.10.9:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.0:b1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.6:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.12:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.11.13:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.9:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.10:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.11:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.12:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:1.12.13:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.0:rc6:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.0:rc7:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:zend:zend_framework:2.5.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-5161
35.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-5161
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
References for CVE-2015-5161
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165173.html
[SECURITY] Fedora 21 Update: php-ZendFramework2-2.4.7-1.fc21
-
http://framework.zend.com/security/advisory/ZF2015-06
Security Advisory - Security - Zend FrameworkVendor Advisory
-
http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html
Zend Framework 2.4.2 / 1.12.13 XXE Injection ≈ Packet StormExploit
-
http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt
Exploit
-
http://www.securityfocus.com/bid/76177
Multiple Zend Products CVE-2015-5161 XML External Entity Injection VulnerabilityExploit
-
https://www.exploit-db.com/exploits/37765/
Zend Framework 2.4.2 - PHP FPM XML eXternal Entity InjectionExploit
-
http://seclists.org/fulldisclosure/2015/Aug/46
Full Disclosure: Zend Framework <= 2.4.2 XML eXternal Entity Injection (XXE) on PHP FPMExploit
-
http://www.debian.org/security/2015/dsa-3340
Debian -- Security Information -- DSA-3340-1 zendframework
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165147.html
[SECURITY] Fedora 22 Update: php-guzzle-Guzzle-3.9.3-5.fc22
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164409.html
[SECURITY] Fedora 23 Update: php-guzzle-Guzzle-3.9.3-5.fc23
Jump to