Multiple cross-site scripting (XSS) vulnerabilities in Zend Framework 2.0.x before 2.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified input to (1) Debug, (2) Feed\PubSubHubbub, (3) Log\Formatter\Xml, (4) Tag\Cloud\Decorator, (5) Uri, (6) View\Helper\HeadStyle, (7) View\Helper\Navigation\Sitemap, or (8) View\Helper\Placeholder\Container\AbstractStandalone, related to Escaper.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=860738 | Issue Tracking Patch Third Party Advisory |
http://framework.zend.com/security/advisory/ZF2012-03 | Vendor Advisory |
https://github.com/zendframework/zf2/commit/27131ca9520bdf1d4c774c71459eba32f2b10733 | Patch Third Party Advisory |
http://www.securityfocus.com/bid/55636 | Third Party Advisory VDB Entry |
http://seclists.org/oss-sec/2012/q3/571 | Mailing List Patch Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688946#10 | Mailing List Third Party Advisory |
https://bugs.gentoo.org/show_bug.cgi?id=436210 | Third Party Advisory |
http://seclists.org/oss-sec/2012/q3/573 | Mailing List Patch Third Party Advisory |
Information
Published : 2020-01-03 09:15
Updated : 2020-01-14 10:51
NVD link : CVE-2012-4451
Mitre link : CVE-2012-4451
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
fedoraproject
- fedora
redhat
- enterprise_linux
zend
- zend_framework