Information Exposure Affecting zendframework/zend-http package, versions >=1.0.0, <2.8.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-ZENDFRAMEWORKZENDHTTP-2805805
  • published29 Apr 2022
  • disclosed28 Apr 2022
  • creditDrupal Security Team

Introduced: 28 Apr 2022

CVE NOT AVAILABLE CWE-200  (opens in a new tab)

How to fix?

Upgrade zendframework/zend-http to version 2.8.1 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure. Marshaling a request URI includes logic that introspects HTTP request headers that are specific to a given server-side URL rewrite mechanism. When these headers are present on systems not running the specific URL rewriting mechanism, the logic would still trigger, allowing a malicious client or proxy to emulate the headers to request arbitrary content.

CVSS Scores

version 3.1