A file disclosure flaw was found in the way SimpleXMLElement class of Zend Framework, a PHP framework, processed XML data provided within certain XML-RPC requests (external XML entities were previously possible to specify by adding a specific DOCTYPE element to particular XML-RPC request). A remote attacker could use this flaw to obtain sensitive information by issuing a specially-crafted XML-RPC request to the Zend Framework based PHP application. References: [1] http://framework.zend.com/security/advisory/ZF2012-01 [2] http://www.openwall.com/lists/oss-security/2012/06/26/2 [3] https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt [4] https://secunia.com/advisories/49665/
This issue affects the versions of the php-ZendFramework as shipped with Fedora release of 16 and 17. Please schedule an update. -- This issue affects the version of the php-ZendFramework as shipped with Fedora EPEL 6. Please schedule an update.
Created php-ZendFramework tracking bugs for this issue Affects: fedora-all [bug 835561] Affects: epel-6 [bug 835562]
The CVE identifier of CVE-2012-3363 has been assigned: http://www.openwall.com/lists/oss-security/2012/06/27/2 to this issue.
php-ZendFramework-1.11.12-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
php-ZendFramework-1.11.12-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
php-ZendFramework-1.11.12-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.