Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2015-5161 — XML External Entity (XXE) Injection in Zendxml
Severity
9.6CRITICALNVD
NVD6.8CNA6.8OSV6.8
EPSS
32.8%
top 3.11%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 25
Latest updateMay 17
Description
The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters.
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4
Affected Packages10 packages
Also affects: Ubuntu Linux 12.04, 14.04, 15.10
🔴Vulnerability Details
6💥Exploits & PoCs
2📋Vendor Advisories
1💬Community
7Bugzilla
▶
Bugzilla▶
CVE-2015-5161 php-ZendFramework2: php-ZendFramework: XML external entity injection (XXE) on PHP FPM [epel-7]↗2015-08-13
Bugzilla▶
CVE-2015-5161 php-ZendFramework: XML external entity injection (XXE) on PHP FPM [fedora-all]↗2015-08-13
Bugzilla▶
CVE-2015-5161 php-ZendFramework2: php-ZendFramework: XML external entity injection (XXE) on PHP FPM [fedora-all]↗2015-08-13