Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 505276 - <dev-php/ZendFramework-1.12.9: XML External Entities and Security Bypass Vulnerabilities (CVE-2014-{2681,2682,2683,2684,2685})
Summary: <dev-php/ZendFramework-1.12.9: XML External Entities and Security Bypass Vuln...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/57276/
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-03-21 16:43 UTC by Agostino Sarubbo
Modified: 2015-03-18 21:58 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-03-21 16:43:28 UTC
From ${URL} :

Description

Some vulnerabilities have been reported in Zend Framework, which can be exploited by malicious people to 
bypass certain security restrictions and disclose certain sensitive information or cause a DoS (Denial of 
Service).

1) Some errors when parsing XML entities can be exploited to e.g. disclose contents of certain local files 
or consume excessive server resources via specially crafted XML documents including external entity 
references.

2) Some errors related to login mechanism of ZendOpenId and Zend_OpenId consumer can be exploited to 
impersonate otherwise restricted users/identities without knowing any credentials and secrets.

The vulnerabilities are reported in versions prior to 1.12.4.


Solution:
Update to version 1.12.4.

Provided and/or discovered by:
The vendor credits:
1) Lukas Reschke.
2) Christian Mainka and Vladislav Mladenov, Ruhr-University Bochum.

Original Advisory:
http://framework.zend.com/security/advisory/ZF2014-01
http://framework.zend.com/security/advisory/ZF2014-02


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Brian Evans (RETIRED) gentoo-dev 2014-10-07 18:45:08 UTC
+*ZendFramework-1.12.9 (07 Oct 2014)
+
+  07 Oct 2014;  <grknight@gentoo.org> +ZendFramework-1.12.9.ebuild,
+  -ZendFramework-1.11.6.ebuild:
+  Version bump for wrt bug 448576 and security bugs 451060, 505276 and 523198

Should be OK to stable as it keeps backwards compatibility with the 1.11 series
Comment 2 Yury German Gentoo Infrastructure gentoo-dev 2014-10-15 05:13:50 UTC
Being Stabilized as part of Bug #523198
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2015-01-03 21:57:17 UTC
CVE-2014-2685 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2685):
  The GenericConsumer class in the Consumer component in ZendOpenId before
  2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4
  violate the OpenID 2.0 protocol by ensuring only that at least one field is
  signed, which allows remote attackers to bypass authentication by leveraging
  an assertion from an OpenID provider.

CVE-2014-2684 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2684):
  The GenericConsumer class in the Consumer component in ZendOpenId before
  2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4
  does not verify that the openid_op_endpoint value identifies the same
  Identity Provider as the provider used in the association handle, which
  allows remote attackers to bypass authentication and spoof arbitrary OpenID
  identities by using a malicious OpenID Provider that generates OpenID tokens
  with arbitrary identifier and claimed_id values.

CVE-2014-2683 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2683):
  Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and
  2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler,
  ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and
  ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and
  ZendService_Api before 1.0.0 allow remote attackers to cause a denial of
  service (CPU consumption) via (1) recursive or (2) circular references in an
  XML entity definition in an XML DOCTYPE declaration, aka an XML Entity
  Expansion (XEE) attack.  NOTE: this issue exists because of an incomplete
  fix for CVE-2012-6532.

CVE-2014-2682 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2682):
  Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and
  2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler,
  ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and
  ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and
  ZendService_Api before 1.0.0, when PHP-FPM is used, does not properly share
  the libxml_disable_entity_loader setting between threads, which might allow
  remote attackers to conduct XML External Entity (XXE) attacks via an XML
  external entity declaration in conjunction with an entity reference.  NOTE:
  this issue exists because of an incomplete fix for CVE-2012-5657.

CVE-2014-2681 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2681):
  Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and
  2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler,
  ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and
  ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and
  ZendService_Api before 1.0.0 allow remote attackers to read arbitrary files,
  send HTTP requests to intranet servers, and possibly cause a denial of
  service (CPU and memory consumption) via an XML External Entity (XXE)
  attack.  NOTE: this issue exists because of an incomplete fix for
  CVE-2012-5657.
Comment 4 Yury German Gentoo Infrastructure gentoo-dev 2015-03-18 21:48:32 UTC
Arches, Thank you for your work.
GLSA Vote: No

Cleaned up as part of Bug 523198
Comment 5 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2015-03-18 21:58:13 UTC
GLSA vote: no.

Closing as [noglsa]