First published: Sat Sep 24 2011(Updated: )
Zend Framework 1.11.3 in Zend Server CE 5.1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by Validate.php and certain other files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zend Framework | =1.11.3 | |
Zend Server | =5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3825 is classified as a moderate severity vulnerability due to the potential exposure of sensitive information.
CVE-2011-3825 allows remote attackers to gain access to sensitive information through error messages by making direct requests to certain .php files.
CVE-2011-3825 specifically affects Zend Framework version 1.11.3 and Zend Server version 5.1.0 CE.
To mitigate CVE-2011-3825, it is recommended to upgrade to a later version of Zend Framework or Zend Server that addresses this vulnerability.
Preventing exploitation of CVE-2011-3825 can involve implementing access controls and error handling that do not disclose sensitive paths in error messages.