ZendFramework Potential Proxy Injection Vulnerabilities
Moderate severity
GitHub Reviewed
Published
Jun 7, 2024
to the GitHub Advisory Database
•
Updated Jun 7, 2024
Package
Affected versions
>= 2.0.0, < 2.0.5
Patched versions
2.0.5
Description
Published to the GitHub Advisory Database
Jun 7, 2024
Reviewed
Jun 7, 2024
Last updated
Jun 7, 2024
Zend\Session\Validator\RemoteAddr
andZend\View\Helper\ServerUrl
were found to be improperly parsing HTTP headers for proxy information, which could potentially allow an attacker to spoof a proxied IP or host name.In
Zend\Session\Validator\RemoteAddr
, if the client is behind a proxy server, the detection of the proxy URL was incorrect, and could lead to invalid results on subsequent lookups.In
Zend\View\Helper\ServerUrl
, if the server lives behind a proxy, the helper would always generate a URL based on the proxy host, regardless of whether or not this was desired; additionally, it did not take into account the proxy port or protocol, if provided.References