Skip to content

URL Rewrite vulnerability in multiple zendframework components

High severity GitHub Reviewed Published Apr 28, 2022 to the GitHub Advisory Database • Updated Jan 7, 2023

Package

composer zendframework/zend-diactoros (Composer)

Affected versions

< 1.8.4

Patched versions

1.8.4
composer zendframework/zend-feed (Composer)
< 2.10.3
2.10.3
composer zendframework/zend-http (Composer)
< 2.8.1
2.8.1

Description

zend-diactoros (and, by extension, Expressive), zend-http (and, by extension, Zend Framework MVC projects), and zend-feed (specifically, its PubSubHubbub sub-component) each contain a potential URL rewrite exploit. In each case, marshaling a request URI includes logic that introspects HTTP request headers that are specific to a given server-side URL rewrite mechanism.

When these headers are present on systems not running the specific URL rewriting mechanism, the logic would still trigger, allowing a malicious client or proxy to emulate the headers to request arbitrary content.

References

Published to the GitHub Advisory Database Apr 28, 2022
Reviewed Apr 28, 2022
Last updated Jan 7, 2023

Severity

High

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-f6p5-76fp-m248

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.