FreeBSD : ZendFramework1 -- SQL injection vulnerability (d3324fdb-6bf0-11e5-bc5e-00505699053e)

critical Nessus Plugin ID 86305

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Zend Framework developers report :

The PDO adapters of Zend Framework 1 do not filter null bytes values in SQL statements. A PDO adapter can treat null bytes in a query as a string terminator, allowing an attacker to add arbitrary SQL following a null byte, and thus create a SQL injection.

Solution

Update the affected package.

See Also

https://www.openwall.com/lists/oss-security/2015/09/30/6

https://framework.zend.com/security/advisory/ZF2015-08

http://www.nessus.org/u?ae688eb7

Plugin Details

Severity: Critical

ID: 86305

File Name: freebsd_pkg_d3324fdb6bf011e5bc5e00505699053e.nasl

Version: 2.8

Type: local

Published: 10/7/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:zendframework1, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/6/2015

Vulnerability Publication Date: 9/15/2015

Reference Information

CVE: CVE-2015-7695