SB2015081207 - Fedora 23 update for php-ZendFramework2, php-guzzle-Guzzle



SB2015081207 - Fedora 23 update for php-ZendFramework2, php-guzzle-Guzzle

Published: August 12, 2015 Updated: April 24, 2025

Security Bulletin ID SB2015081207
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2015-5161)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters. <a href="http://cwe.mitre.org/data/definitions/611.html">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>


Remediation

Install update from vendor's website.