Zend Framework < 2.3.8 / 2.4.x < 2.4.1 HTTP Response Splitting

Medium Nessus Network Monitor Plugin ID 9138

Synopsis

The remote host is using a version of Zend Framework that is vulnerable to HTTP response splitting attacks.

Description

Versions of Zend Framework earlier than 2.3.8, or 2.4.x earlier than 2.4.1 are vulnerable to a flaw in the 'Zend\Mail' and 'Zend\Http' components that is triggered as CRLF (Carriage Return and Line Feed) character sequences are not properly sanitized before being included in responses. This allows a context-dependent attacker to inject additional headers into responses to conduct HTTP response splitting attacks.

Solution

Upgrade Zend Framework to version 2.4.1 or later. If version 2.4.x is not available, version 2.3.8 is also patched for these vulnerabilities.

See Also

http://framework.zend.com

http://framework.zend.com/changelog/2.3.8

Plugin Details

Severity: Medium

ID: 9138

Family: CGI

Published: 2016/03/15

Modified: 2016/03/15

Dependencies: 9135

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:thomas_breuss:zend_framework_integration_zend_framework

Patch Publication Date: 2015/05/07

Vulnerability Publication Date: 2015/05/07

Reference Information

CVE: CVE-2015-3154

BID: 74561